Google removed 41 Judy-infected Android apps from Play Store
MobileAppDaily

Around 41 Apps Got Attacked by Judy Virus, Google Detached The Infected Apps

almost 18 million of users downloaded the malware till now.

google published date 30th May, 2017 James Lawson

With the rapid growth of mobile app economy reach of the app technology is in millions. This technology is used to get the maximum outreach and enhance the business via digital trends. However generating revenue isn't always by the good means some take the bad decisions to earn money. Malware is so obvious nowadays and apps frequently got infected by the hackers who enabled this malware to infect the apps for their profit.

According to latest mobile app technology news tech giant Google has removed many apps after a malware named ‘Judy’ infested the apps in Play Store. Judy is a new malware which infected over 41 Android apps in Google Play store and it has infected 8.5 million to 36.5 million users. This malware was first suspected by a security research firm Check Point, which instantly alerted the Google. Afterward, Google immediately took step and removed the infected apps to save the user from further harm.

What is it and from where it came from?

The security firm Check point who found this malware have researched and found about this malware have managed to reach 4 million to 18.5 million of downloads on the Google Play Store. According to the firm in their blog post, this malware is “auto-clicking adware”  and the apps are also spotted by the firm which is created by a South Korean based firm. This malware is used to target the infected devices and create false clicks on ads to generate revenue for the developers.

 

The name of the company is Kinikini, which is mentioned as ENISTUDIO corp in the Google Play Store. The company basically develops Android and iOS apps.

How Judy malware Works?

The main of the creation of Judy malware is to boost the revenue through false clicking on the ads. The malware firstly bypassed the Google Play store security and then hackers created a bridgehead app to connect the server to the user's device, then finally inserted it into the store.

After the application is installed on the victim's device the main control server delivers the actual malicious payload. These includes Javascript codes, which is user-agent strings and URLs controlled by the malware developers.

The URL imported through the malware opens the targeted websites and the codes are used to click on the ad banners. The more the click on the ads more the payment to the creators from the website owners.

 

This malware breach into the Google play store which is a big miss by the Google security. Google claims to have the inevitable security infrastructure in play store around the clock. This incident roll just after the Google I/O 2017 in which company announces Play Protection, new security approach for Android Apps.Google need to be more careful with the security breaches in the Play Store, we hope Play protection will add an extra layer to the security and eliminates these kinds of attempts.

For the latest tech news and reviews, follow MobileAppDaily on Twitter, Facebook, LinkedIN, Instagram and Flipboard.

James Lawson

James Lawson

James is a writer and editor at MobileAppDaily and he is famous as a tech journalist at MobileAppDaily. He focuses on the mobile app startups & ventures and brings them to the light. He has started his career as a tech writer 6 years ago just after completing his degree in Broadcast and Digital Journalism.

Was this article helpful?