• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • December 5th, 2019
  • Home
  • About Us
  • Team
  • Advertise
  • Submit News
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Google+
    • Linkedin
    • Youtube
Home » Security » Malware » Fake Google Chrome Android App Infecting Users with Malicious Payload

Fake Google Chrome Android App Infecting Users with Malicious Payload

May 11th, 2017 Jahanzaib Hassan Malware, Security 0 comments
Fake Google Chrome Android App Infecting Users with Malicious Payload
Share on FacebookShare on Twitter

Google Chrome is the go-to browser for almost all the Android users. There is, however, one thing that you need to keep in mind when downloading the browsers for your Android phone.

Famous for its poor security measures, Google play store has been an example over the past few years and now the IT security researchers at SophosLabs have spotted a malicious lookalike (Andr/SandRat-C) of the famous Google Chrome browser and the users who are used to downloading apps from third party stores are in trouble. Furthermore, they suspect that some other malware “Andr/Rootnik-AH” might even be on the Google play store.

[irp posts=”51713″ name=”Latest Google Chrome Scam Aims At Stealing Credit Card Data”]

According to a security researcher at SophosLabs, Rowland Yu “the main point is that Google Play allows a compromised certificate [through the associated malware], though they know the certificate has been used to sign rootkit malware.”

As per reports, the malicious Chrome version is Andr/Rootnik-AH, and the malware is capable of reading and sending messages from the infected device, recording media, querying location, etc.

Not the first time

This isn’t the first time that security researchers have spotted a compromised app, though previously Google Play store was free from such ill apps. Back in 2015, an infected version of Chrome “Andr/SandRat-C” was seen to infect the users as well, but it wasn’t allowed entry in the Play store.

“When the first hacked version of Chrome was discovered in 2015, a few people were still downloading apps outside of Google Play,” Yu explained.

Evade Digital Signatures

Digital signatures are used to verify the authenticity of apps, and according to security researchers, the malware is capable of evading digital signatures. Furthermore, the fake Google Chrome browser displays the same icons as the legit on making it much harder to spot the difference between the two.

[irp posts=”51188″ name=”Chrome Users Beware- Do Not Fall Prey to Missing Font Malware Campaign”]

Over the past few months, 292 malicious apps have been taken down from Google play. However, there are further 400 shady apps still in the play store. As the security experts are finding new ways to cope with cybersecurity threats, hackers are working hard too. And it looks like some serious scrutiny of the security measures is needed. Here are two lists of malicious apps 1 and 2 identified by SophosLabs.


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • Android
  • app
  • Chrome
  • Google Play
  • internet
  • Malware
  • Scam
  • security
Facebook Twitter Google+ LinkedIn Pinterest
Previous article Face recognition system at US airports may target citizens
Next article Hospital computers across England hacked; cyber criminals demanding ransom
Jahanzaib Hassan

Jahanzaib Hassan

Related Posts
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

Flawed Implementation of RCS Standard putting data of millions at risk

Flawed Implementation of RCS Standard putting data of millions at risk

This Smartwatch is exposing real-time location data of thousands of kids

This Smartwatch is exposing real-time location data of thousands of kids

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

LATEST POSTS
Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns
Surveillance

Israeli firm buys Private Internet Access (PIA) VPN raising privacy concerns

6
Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors
Cyber Attacks

Chinese DDoS tool Great Cannon resurfaces to target Hong Kong protestors

113
Flawed Implementation of RCS Standard putting data of millions at risk
Security

Flawed Implementation of RCS Standard putting data of millions at risk

360
3 arrested, 30,000+ piracy sites shut down in global operation IOSX
News

3 arrested, 30,000+ piracy sites shut down in global operation IOSX

536

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us