7 Apps on Google Play Drop Malware & Opens Backdoor to Hackers DUMPSCC, mc-storeat

Researchers discovered seven malicious apps from Google play store that drops malware and adware on Android users and opens backdoor access to the attackers.
These apps installed over 11,000 Android users from Google Play. These apps perform various malicious activities including drain device battery and consume excessive amounts of mobile data.
Mobile malware is continuously increasing and the threat actors always finding new ways to bypass security features in Google play by deploying the various tactics and techniques to target the millions of Android users around the world.
3 Different developers have uploaded these following malicious apps on Google play store.
“The dropper apps are designed to download and install APKs from a GitHub repository, essentially opening a backdoor on the device for any new application functionality to be installed.”
Malware droppers are carefully handling the communication with GitHub and wait for the initial setup for evading detection by security researchers and malware detection agents.
GitHub URL embedded within the Dropper App code and it is completely obfuscated to avoid flagging the by human analysis and escape from Google Play protect scan.
Researchers uncovered the configuration data for the dropper app and additional URLs from the obfuscated JSON message and it pointed to the Adware APK.
After the installation of the malicious dropper apps, the adware APK will be triggered and wait for 10 min before starts its malicious activities.
The App aggressively showing fullscreen video ads, outside of the app, without any user interaction and the app are capable of performing overlaying other applications to displaying the Ads anytime once the user’s Android device gets unlocked.
But if the user’s device protected with a password, it won’t bypass the passcode but it simply turns on the screen and run the video ads in the background that cause CPU spikes and battery consumption.
Only manual dismissal is an option to stop the ad because the adware can self-execute without user interaction and its continuously running the video ads without user attention when the mobile kept in the bag or packet.
These apps also violate the following Google policy,
Recommend that users with these apps installed find both the dropper apps and payload apps and uninstall them manually from the device.
Recently Google tied up with mobile security companies to find bad apps before it reaches the user device. The primary goal of the alliance is to make Google play more secure.
DUMPSCC mc-storeat