• Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
HackRead
  • April 23rd, 2021
  • Home
  • Advertise
  • Privacy Policy
  • Contact Us
HackRead
  • Hacking News
    • Leaks
    • WikiLeaks
    • Anonymous
  • Tech
    • Android
    • Apple News
    • BlackBerry
    • Google News
    • Microsoft
    • Motorola
    • Nokia
    • Samsung
    • 3D
  • Cyber Crime
    • Phishing Scam
  • How To
  • Cyber Events
    • Censorship
    • Cyber Attacks
  • Security
    • Malware
  • Surveillance
    • Drones
    • NSA
    • Privacy
  • Explore
    • Gaming
    • Science
    • Viral
  • Follow us
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
Home
Technology News
Android

Super Free Music Player Android App Comes with Malware Infection

May 3rd, 2017 Ali Raza Security, Android, Malware 0 comments
Super Free Music Player Android App Comes with Malware Infection
Share on FacebookShare on Twitter

A music app in the Google Play Store called Super Free Music Player turns out to be yet another malware-infected app that Google has missed. So far, between 5,000 and 10,000 people have downloaded it.

The app was uploaded to the Play Store on March 31 this year, which means that it was posted for more than a month before it was discovered. Once downloaded, the malware activates and downloads additional payloads from remote websites, as well as upload the data from the infected Android device. The data that can be uploaded includes reports about the apps that are installed, model, manufacture, phone’s SDK version, the country and even which language the phone is set.

Related: How to use Google Search to locate your lost Android Smartphone or Tablet

The infected app itself used a technique that was witnessed earlier in case of the BrainTest malware. This technique can bypass detection even when it comes to Google and its researchers, at least according to researcher Rowland Yu of SophosLabs.

Super Free Music Player App / Image Via SophosLabs / Source: Google Play Store

BrainTest was discovered in 2015 by Check Point on a Nexus 5 smartphone. The malware used several techniques to remain undetected in the Play Store, as well as to simply remain on the infected device. After the discovery, Google Play was quick to remove the malware, but now it is back with a new name.

  • It came back to Google Play as Super Free Music Player (Andr/Axent-DS) and attracted 5,000 – 10,000, according to SophosLabs

The discovery was almost accidental, and it happened as a part of the malware hunt that was organized in order to purge the infected apps. Google Play Store is having quite a problem with the infected applications lately, and this sweep was necessary after some apps were discovered to be infected for months, while some were there for years, spreading infections without anyone noticing. The most used malware was the FalseGuide malware, that infected over 40 apps and more than 2 million users during 5 months before it was discovered.

Furthermore, last month, a Trojan called BankBot was found targeting hundreds of the Play Store’s apps. Its ‘job’ was to steal online banking credentials from the infected device. Another incident happened in March when 87 mods for Minecraft appeared in the Play Store. Almost 1 million people downloaded them and were instantly bombarded by ads and scam activities.

Related: New Android ransomware proves why antivirus software are a joke

This has become quite a problem, and the Play Store seems to be too big for a regular sweep, so the elimination of all of these apps pretty much became a whack-a-mole activity. Check Point is doing its best to help out Google by reporting the malicious apps, leading Google to quickly a removal. However, new malicious apps are being uploaded as soon as the problem is solved, turning to an endless cycle, and not even Google has figured out how to stop it so far.

Image Credit: Flickr


DDoS attacks are increasing, calculate the cost and probability of a DDoS attack on your business with this DDoS Downtime Cost Calculator.

  • Tags
  • Android
  • APPS
  • Cyber Crime
  • Google Play
  • hacking
  • internet
  • Malware
  • Privacy
  • security
Facebook Twitter LinkedIn Pinterest
Previous article Unity 3D Forums Hacked by OurMine Hacking Group
Next article Shodan' Malware Hunter to Expose Command & Control Centers of Botnets
Ali Raza

Ali Raza

Ali Raza is a freelance journalist with extensive experience in marketing and management. His work has been featured in many major crypto and tech websites including Hacked, Hackread, ValueWalk, Cryptoslate, CCN, and Globlecoinreport to name a few. Raza is the co-founder of 5Gist.com, too, a site dedicated to educating people on 5G technology.

Related Posts
Hacked Android phones mimicked connected TV products for fake ad views

Hacked Android phones mimicked connected TV products for fake ad views

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Play Store apps plagued with malware have 700,000 downloads

Play Store apps plagued with malware have 700,000 downloads

Newsletter

Get the best stories straight into your inbox!



Don’t worry, we don’t spam

Latest Posts
Hacked Android phones mimicked connected TV products for fake ad views
Cyber Crime

Hacked Android phones mimicked connected TV products for fake ad views

Signal CEO hacks Cellebrite cellphone hacking, cracking tool
Hacking News

Signal CEO hacks Cellebrite cellphone hacking, cracking tool

Play Store apps plagued with malware have 700,000 downloads
Security

Play Store apps plagued with malware have 700,000 downloads

HACKREAD is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance and Hacking News with full-scale reviews on Social Media Platforms & Technology trends. Founded in 2011, HackRead is based in the United Kingdom.

Follow us