Skip Ribbon Commands
Skip to main content
Computer Emergency Response Team of Mauritius (CERT-MU)
Computer Emergency Response Team of Mauritius>Fake games in Google Play redirect Android users to porn sites

Fake games in Google Play redirect Android users to porn sites


Five malicious Android apps posing as games made their way into the Google Play store for nearly a week, and during that time each app was downloaded by between 5,000 and 10,000 users, according to new research from Avast. The threat is detected by Avast as “Clicker-AR”, and indicates that the following apps are infected: Extezaf tita, Kanlani Titaas, Kapith Yanihit, Barte Beledi, and Olmusmi bunlar. The apps – from Ngu Studios  use images from genuine franchises such as Minecraft, Hitman and Batman. From a user perspective, the malicious apps which were in the Google Play store from July 14 to July 21 – do nothing other than display static gaming images when opened. In the background, however, the apps are actually causing redirections to porn websites when the user opens their browser or other apps on their Android device, the blog post indicated, adding that only terminating the apps will stop the redirections. A requested permission is what enabled the malicious apps to function.
Source:
SC Magazine
 
Social Media News
 
Team Cymru
 
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis