Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Android Apps for Google Play Predictably Developed with Malware-tainted Windows PCs

 

Security researchers from Palo Alto Networks a security company claim that malicious coding exists in 132 Android applications present in Google's Play Store, predicting that the applications' developers had created them utilizing infected PCs. The applications produced concealed iframes else one HTML file implanted on a web-page, connected with 2 domains which harbored malware.

 

The situation makes one ponder as there is not enough credibility in it. The apps, which are creations of 7 individual developers, have very small hidden iframes connecting with malevolent domains through HTML pages that contain the iframes. Softpedia.com posted this online dated March 1, 2017.

 

The security company on finding the tainted Android apps informed Google expecting the Internet giant would remove them. It is felt the application developers inadvertently utilized a contaminated programming interface for writing the apps. An important aspect of the creations is that all the seven developers are geographically close to Indonesia while most of them have used the country name 'Indonesia' within the names of their applications.

 

Oddly enough the inclusion of the country name means little considering Android owners will not be affected with a name anyway. However, it is probable that the application developers worked on malware-infected Windows computers.

 

Some form of malicious programs like Ramnit created for Windows computers hunt to see files on the systems so they can be injected with destructive code. Once these viruses contaminate a Windows PC they look for HTML documents inside the computer's hard drive followed with attaching iframes to the searched docs, explains Palo Alto Networks.

 

Naturally, if the Ramnit kind of virus infected the developers' systems, the infection could affect the HTML documents of their applications, the security company tells additionally.

 

As said the developers bear a close proximity with Indonesia, which makes the security researchers conjecture the infection may have spread from that country via the use of a same website domain alternatively an identical application generating protocol that is unfortunately tainted. It appears that no damage has so far occurred to Android smart-phone owners owing to the contaminated applications, the security experts from Palo Alto Networks assert.

» SPAMfighter News - 03-03-2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.
To reward your interest, we would like to offer you any of our award-winning products
at the price $19.95. Pick your own favorites.

Go back to previous page
Next