August 19, 2019 By David Bisson 2 min read

An evasive family of adware posed as 85 photography and gaming apps available for download on the Google Play store.

Trend Micro observed that the adware, detected as AndroidOS_Hidenad.HRXH, had infiltrated 85 apps available for download on Google Play. Those programs boasted a combined total of 8 million downloads at the time of detection. The security firm disclosed its findings to Google, at which time the tech giant’s researchers removed the apps from Google Play.

Once launched, the malicious apps recorded the current time and network time from an infected device. They then registered a Broadcast Receiver to help monitor if a user was present after someone had woken up the device. The apps arrived with techniques through which they could evade time-based detection techniques or other capabilities employed by traditional sandboxes. Beyond those tactics, the apps hid their icons, created a shortcut on the home screen and used Java reflection to further avoid analysis.

Hidden Adware on the Play Store

Threat actors have a history of concealing adware on the Google Play store. In November 2018, Trend Micro came across several apps on the Play store disguised as voice messenger platforms that sought to generate fraudulent ad clicks and automatically display fake surveys.

Several months later, Check Point uncovered 206 applications infected with SimBad adware, which had collectively registered close to 150 million downloads on the Play store. And in June 2019, Lookout discovered 238 applications available for download on the Google Play store that each harbored BeiTaPlugin, adware that rendered an infected device nearly unusable.

How to Defend Against Mobile Threats

Security professionals can help defend their organizations against mobile threats by using artificial intelligence-powered solutions that use context and other information to determine whether certain device behaviors are legitimate. Companies should also leverage a unified endpoint management (UEM) solution to monitor how devices interact with the environment and flag anything that might appear suspicious.

More from

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

FBI, CISA issue warning for cross Apple-Android texting

3 min read - CISA and the FBI recently released a joint statement that the People's Republic of China (PRC) is targeting commercial telecommunications infrastructure as part of a significant cyber espionage campaign. As a result, the agencies released a joint guide, Enhanced Visibility and Hardening Guidance for Communications Infrastructure, with best practices organizations and agencies should adopt to protect against this espionage threat. According to the statement, PRC-affiliated actors compromised networks at multiple telecommunication companies. They stole customer call records data as well…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today