Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Google prohibits 158,000 malicious Android App Developer Accounts in 2024
Global Security

Google prohibits 158,000 malicious Android App Developer Accounts in 2024

AdminBy AdminJanuary 31, 2025No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Google said it blocked more than 2.36 million Android policies applications that have been published on the Google Play App in 2024 and banned more than 158,000 bad accounts for developers who tried to publish such harmful applications.

The technical giant also noted that during this period of time it prevented 1.3 million applications from getting excessive or unnecessary access to sensitive users while working with third -party app developers.

In addition, Google Play Protect, A Security function This is allowed by default on the Android device for the flag of new threats that have discovered 13 million new malicious applications outside the official app store.

“As a result of close partnership with developers over 91% of applications are installed in Google Play store, which now use the latest Android 13 or more defense,” Bethel Otuteye and Khawaja Google Play Trust and Security – Note.

For comparison, the company has blocked 1.43 million and 2.28 million Risky apps from Play Store in 2022 and 2023 respectively.

Cybersecurity

Google also said the use of developers Play in API integrity .

In addition, the company’s efforts to Automatically block the boot Potentially dangerous applications in markets such as Brazil, Hong Kong, India, Kenya, Nigeria, Philippines, Singapore, South Africa, Thailand and Vietnam, provided 10 million devices with at least 36 million risky installation attempts by drawing more than 200,000 Unique applications.

Complementing these initiatives, Google this week has announced that it submits a new “proven” sign for VPN applications, which have come to consumers who have successfully completed your mobile app security (MASA). Google initially submitted this plan In November 2023.

“This new icon is designed to emphasize applications that prioritize privacy and security priorities help users make a more substantiated choice of VPN applications that they use, and create confidence in the supplements they ultimately load,” – Note.

If anything, data show that Android and Google Play protection is constant effort as the new malware continues to find the road to mobile devices.

The most recent example is Tria Ctyler, which was found primarily on Android users in Malaysia and Brunei. The company is believed to have been going on at least March 2024.

Distributed by personal and group chats in Telegram and WhatsApp as APK files, malicious applications require sensitive business permits, and Yahoo! Mail.

There are some data that suggest that malicious software is the work of the Indonesian threatening actor, due to the presence of artifacts written in Indonesian, and the names of the telegrams used to hold teams and control (C2) servers.

Cybersecurity

“Tria Steelre collects SMS victim data, tracks call logs, messages (eg WhatsApp and WhatsApp Business), as well as e -mail data (eg, Gmail and Outlook), Caspersorski – Note. “Tria theft highlights the data by sending them to different telegrams using API Telegram for communication.”

The stolen information is then used to kidnap personal messages such as WhatsApp and Telegram, and put themselves for the victims, trying to ask for money from contacts to their bank accounts, and to perpetuate AFU for all their family and friends.

The fact that TRIA theft can also retrieve SMS messages shows that operators can also use malicious software for theft of one-time passwords (OTPS), which potentially provides them with access to various online service, including bank accounts.

Caspersky said the company demonstrates some similarities with another cluster of activity that distributed a piece of malicious software called Udangastel in 2023 and in early 2024, focusing on Indonesian and Indian casualties using wedding invitation, delivery of packages and bait support Customers. However, at this stage there is no evidence to tie two families of malware to the same actor.

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025

Fedramp at starting speed: obtained lessons

June 18, 2025

CISA warns about the active exploitation of vulnerability of the Linux kernel escalation

June 18, 2025

Ex-Analytics-Tsru, sentenced to 37 months for leaks of secret documents on national protection

June 18, 2025

Iran slows the Internet to prevent cyber -napades against the background of escalation of regional conflict

June 18, 2025

RCE Critical Error RCE Rate 9.9 CVSS in Backup and Replication

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025

Water Prought works 76 GitHub accounts for a multi -stage malicious company

June 18, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.