Google explains how Android malware slips onto Google Play Store

The Google Cloud security team highlighted the widespread practise of “versioning” used by bad actors to bypass the security and review checks in the Google Play Store and install malware on Android devices.

The method is either dynamic code loading (DCL), which loads malicious code from servers controlled by threat actors, or it introduces the malicious payloads through updates sent to programmes that have already been installed.

By evading the app store’s static analysis tests, it enables threat actors to deploy their payloads as native, Dalvik, or JavaScript code on Android devices read more Google explains how Android malware slips onto Google Play Store.

Stay informed with the best cybersecurity news and raise your cybersecurity awareness with our comprehensive coverage of the latest threats, breaches, and solutions.

Leave a Reply

Your email address will not be published. Required fields are marked *