• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 6th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Security » 60 Android apps for kids found infected with Pornographic malware

60 Android apps for kids found infected with Pornographic malware

January 13th, 2018 Waqas Malware, Security 0 comments
60 Android apps for kids found infected with Pornographic malware
Share on FacebookShare on Twitter

There is nothing surprising about Play Store hosting malware which infects Android devices but earlier today, IT security researchers at Check Point discovered 60 Android apps on Play Store infected with a malware that displays highly inappropriate and x-rated ads to users in which majority are children.

This means not only the financial sector, government or healthcare industry, cybercriminals have also found a new target which is vulnerable children since some of the infected apps include Drawing Lessons Lego Ninjago, Paw Puppy Run Subway Surf, Mcqueen Car Racing Game, Anime Pictures, Subway Banana Run Surf, Shin Hero Boy Adventure Game, and Addon Sponge Bob for MCPE etc.

The full list of malicious apps is identified by Check Point is available here. The list also shows some of the infected apps were downloaded between 3 million and 7 million times.

Dubbed AdultSwine by researchers, the malware works in four ways, for instance, it displays pornographic ads from the web, tricks users into installing fake security apps, steals data and signups users to premium services without their knowledge which costs victims money in real life.

60 Android apps for kids found infected with Pornographic malware

Screenshot for one of the ads grabbed by researchers (Credit: Check Point)

It must be noted that the displayed ads do not belong to Google Adsense service but to a third-party one.“The most shocking element of this malicious app is its ability to cause pornographic ads (from the attacker’s 3rd party library) to pop up without warning on the screen over the legitimate game app being displayed.,” Check Point said.

According to researchers, the hackers behind the scam use scare tactics to trick victims into downloading phony “security apps” which display a fake alert about the presence of a virus on their device. The alert then asks victims to tap on “Remove Virus Now” tab however tapping takes them to another app Play Store called “virus removal solution” which is yet another fake app.

Furthermore, the malware displays a fake survey window on the screen that asks victims to provide their phone number, answer four questions to win an iPhone. In reality, the phone number is used by the attackers to register for expensive premium services.

60 Android apps for kids found infected with Pornographic malware

(Credit: Check Point)

The good news is that Check Point reported the issue to Google who immediately booted off the malicious apps from the Play Store.

Parents need to be vigilant on what their children are downloading from the Play Store. Previously, a family who bought an Android tablet for their kid as a Christmas gift found pornographic clips on the tablet. Moreover, parents should use restrictions to prevent downloading of apps and purchase on their Android devices and use an updated security software at all times.

  • Tags
  • Android
  • APPS
  • Fraud
  • Google
  • internet
  • Malware
  • Play Store
  • Privacy
  • Scam
  • security
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Attackers Exploit Oracle WebLogic Flaw to Mine $266K in Monero
Next article Lenovo removes backdoor present in networking switches since 2004
Waqas

Waqas

I am a UK-based cybersecurity journalist with a passion for covering the latest happenings in cyber security and tech world. I am also into gaming, reading and investigative journalism.

Related Posts
5 things you should never do when using anonymous operating systems

5 things you should never do when using anonymous operating systems

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Flawed Implementation of RCS Standard putting data of millions at risk

Flawed Implementation of RCS Standard putting data of millions at risk

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
5 things you should never do when using anonymous operating systems
Security

5 things you should never do when using anonymous operating systems

190
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
Surveillance

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

4279
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors
Cyber Attacks

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

422
Flawed Implementation of RCS Standard putting data of millions at risk
Security

Flawed Implementation of RCS Standard putting data of millions at risk

547

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us