Google has removed 13 malware-ridden apps from the Play Store earlier today, after finding malicious code able to auto-review and seek root privileges on the smartphone.
The code is from the malware family Brain Test, responsible for Shedun, Shuanet, and Shiftybug, according to security firm Lookout. This type of malware has been spotted outside of Google Play before, on third-party app sites. The difference this time is these 13 apps managed to sneak onto the store, making them much more dangerous to the average Android user.
The 13 apps include:
- Cake Blast
- Jump Planet
- Honey Comb
- Crazy Block
- Crazy Jelly
- Tiny Puzzle
- Ninja Hook
- Piggy Jump
- Just Fire
- Eat Bubble
- Hit Planet
- Cake Tower
- Drag Box
All the apps are games, and targeted at a young audience. If you have them installed, delete them now.
Millions of people have apparently downloaded the apps, but there are still one or two jumps for the malware to make before it can gain root privileges. That means some users might be safe, despite downloading the app.
Google has not said how it missed the malware-ridden apps. In past cases, the developer adds the malware through an update, or hides it inside a legitimate folder or piece of code.
If the malware has gained access to root privileges, the consequences could be dire. Once an infestation gains access to the main controls, it can tamper with all sorts of functionality on the device, including screen watching and tracking keystrokes.
There is ways to remove the malware, including a root explorer or re-flash a manufacturer ROM. That might sound like mumbo jumbo for a non-techie, but there are guides on how to do this — you can also contact your device manufacturer or carrier if you’re really worried.
- Windows Update not working for your latest upgrade? Here’s how to fix it
- What is RCS messaging? Everything you need to know about the SMS successor
- The best free antivirus software for 2020
- The best browser for Mac in 2020
- How to install third-party fonts in iOS 13