According to the detection statistics collected by Dr.Web for Android, in November 2023, users were less likely to encounter adware trojans from the Android.HiddenAds and Android.MobiDash families. The activity of the former decreased by a quarter (25.03%) and the latter—by more than a third (35.87%). Moreover, banking trojans and malicious spyware apps were detected less often—by 3.53% and 17.10%, respectively.
At the same time, malicious actors again distributed malware via Google Play. Our specialists uncovered over 20 trojan apps from the Android.FakeApp family that are used for fraudulent purposes. In addition, they found a trojan that subscribed Android device users to paid services.
PRINCIPAL TRENDS IN NOVEMBER
- A decrease in adware trojan activity
- A decrease in banking malware and spyware trojan activity
- The distribution of new malicious apps via Google Play
Threats on Google Play
In November, Doctor Web’s virus laboratory discovered more malicious programs from the Android.FakeApp family on Google Play. Some of them were distributed under the guise of financial apps, like home accounting solutions, reference books, directories and teaching aids, programs for accessing investment services, etc. Among these were Android.FakeApp.1497, Android.FakeApp.1498, Android.FakeApp.1499, Android.FakeApp.1526, Android.FakeApp.1527, and Android.FakeApp.1536. Their main task is to load fraudulent websites where users are invited to become investors. For this, they need to provide their personal information.
Another fake app, Android.FakeApp.1496, was hiding in a directory program for accessing legal information. It could load a website that allegedly could help victims of investment scammers get back their lost money.
The website this trojan loaded is shown below. The visitor must answer several questions and then fill out a form to “get a free consultation with a lawyer”.
Malicious actors passed off other fake apps as games. For example, Android.FakeApp.1494, Android.FakeApp.1503, Android.FakeApp.1504, Android.FakeApp.1533, and Android.FakeApp.1534. In some cases, these actually can work as games, but their primary task is to load online casino and bookmaker websites.
Examples of how these trojans operate as games:
An example of a bookmaker site that one of these trojans loaded:
In addition, our specialists discovered another malicious program that subscribes users to paid services. Malicious actors distributed it under the guise of the Air Swipes, an app for controlling Android devices using gestures.
Upon launching, this trojan loads the website of an affiliate service through which the subscription is made:
If the victim launches the app when their Internet connection is disabled or if the target site is not available for loading, the trojan pretends to be the promised application. However, reporting that an error has occurred, it does not provide any useful functionality. The Dr.Web anti-virus detects this trojan application as Android.Subscription.21.
To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.
Indicators of compromise
Your Android needs protection.
Use Dr.Web
- The first Russian anti-virus for Android
- Over 140 million downloads—just from Google Play
- Available free of charge for users of Dr.Web home products
Free download