According to detection statistics collected by the Dr.Web for Android anti-virus, in the second quarter of 2024, Android.HiddenAds adware-displaying trojans were most commonly detected on protected devices. The second most common malicious programs were trojans from the Android.FakeApp family. Cybercriminals use these to execute various fraudulent schemes. The most frequently detected representative of this family was Android.FakeApp.1600, a trojan that our experts discovered in late May. It is distributed via malicious sites from which it is downloaded as a gaming app. However, when launched, this fake app loads the website specified in its settings. Known modifications of the program load an online casino site. Its visitors are offered the chance to play a “wheel of fortune” type of game, but when they try to do so, they are redirected to a registration page. The high detection rates of this malicious program can be explained by the fact that the people behind it are promoting it via in-app ads in other software, for example. When users tap on such an ad, they end up on a corresponding malicious website from which the trojan is downloaded. The third most widespread malicious programs were Android.Spy trojans, which possess spyware functionality.
At the same time, Doctor Web’s virus laboratory uncovered more threats on Google Play. Among them were various fake apps from the Android.FakeApp family and the unwanted Program.FakeMoney.11 app, which supposedly allows virtual rewards to be converted into real money that can then be withdrawn. Moreover, threat actors again used Google Play to distribute a trojan that subscribes victims to paid services.
PRINCIPAL TRENDS OF Q2 2024
- Android.HiddenAds ad-displaying trojans remain the most active Android threats
- The emergence of more threats on Google Play
Threats on Google Play
In Q2 2024, Doctor Web’s virus laboratory discovered more Android.FakeApp trojans on Google Play. Some of them were being distributed under the guise of finance-themed software and apps for participating in surveys and quizzes:
They could load fraudulent sites on which potential victims, supposedly on behalf of famous credit organizations, as well as oil and gas companies, were offered the chance of getting a finance education or becoming investors. To access one or another “service”, users had to answer several questions and then provide personal data.
Other Android.FakeApp trojans were hiding in different games. Under certain conditions, instead of the declared functionality, they would load bookmaker and online casino websites.
Another trojan from this family, Android.FakeApp.1607, was disguised as an image collection app. It did provide the claimed functionality but could also load online casino websites instead.
Threat actors passed off several Android.FakeApp members as job-search programs:
These trojans (Android.FakeApp.1605 and Android.FakeApp.1606) load fake vacancy lists where users are asked to contact “employers” via messengers (Telegram, for example) or to send out a “resume” by providing personal data. After attracting their potential victims’ attention, fraudsters can lure them to various dubious money-making schemes in an attempt to steal their money.
Our specialists also discovered another unwanted program from the Program.FakeMoney family. Such apps offer users various tasks to complete in order to receive virtual rewards. These rewards supposedly could then be withdrawn as real money. In fact, these programs mislead Android device owners as no real payouts are made. The purpose of such software is to encourage users to keep using it as long as possible so that the displayed ads bring a profit to the developers.
One identified app (Program.FakeMoney.11) is a variation of the win-win “one-arm bandit” game. When users play it and also watch the in-app ads, they receive virtual rewards. When they try to withdraw their “earned” money, the program delays this process, putting more and more conditions on it. If users eventually “successfully” submit a withdrawal request, they will end up in some “under consideration” queue of up to several thousand other “applicants”.
In addition, another trojan from the Android.Harly family (Android.Harly.87) was distributed via Google Play. Malicious programs of this family subscribe victims to paid services.
To protect your Android device from malware and unwanted programs, we recommend installing Dr.Web anti-virus products for Android.
Indicators of compromise