malicious apps

AppWizard
April 6, 2026
A new malware threat called "NoVoice" has been found in over 50 applications on the Google Play Store, with 2.3 million installations on Android devices. Discovered by McAfee, this malware is hidden in seemingly harmless apps like system cleaners, games, and image galleries. It exploits Android vulnerabilities to gain root access, potentially allowing attackers to steal sensitive information and manipulate applications without user consent. In some cases, it may persist even after a factory reset. Google has stated that Android devices updated since May 2021 are protected against this threat and that Google Play Protect actively removes malicious apps and blocks new installations. The malware was not able to infect devices in Beijing and Shenzhen, suggesting the attackers may be avoiding local law enforcement. One identified app carrying the NoVoice payload is SwiftClean, developed by Biodun Popoola. The malware operates using a silent audio file, executing its code without user detection. Users are advised to download apps only from the Google Play Store and keep their devices updated.
AppWizard
March 21, 2026
In 2010, the author purchased a Samsung Galaxy 5, which introduced them to the Android ecosystem characterized by freedom, openness, and choice. By 2026, the Android platform had evolved significantly, with restrictions on sideloading impacting the author's nostalgic view of the system. The early 2010s were marked by diverse hardware innovations, such as microSD expansion and customizable features, alongside software freedom that allowed for extensive customization and app installations. Over time, Android transitioned to a more structured ecosystem focused on user safety, reflecting the need to protect personal information. The author acknowledges the trade-off between openness and security, recognizing the importance of safeguarding users, even if it means accepting a more restrictive environment.
AppWizard
March 20, 2026
Google is revising its approach to Android sideloading by allowing users to install applications from unverified developers while implementing a new 24-hour process to enhance security. Users must activate developer mode, confirm their decision, restart their devices, and re-authenticate before installation. A one-time 24-hour waiting period is also introduced to prevent scams. This change addresses concerns from developers and advocacy groups about the impact of stringent verification policies on smaller developers. Google is also offering limited-distribution accounts for students and hobbyists to share apps without full verification. The updated process includes additional security measures to disrupt scams, while users are encouraged to use dedicated security solutions for better protection against mobile threats.
AppWizard
March 13, 2026
MWC (Mobile World Congress) in Barcelona is a significant event for the tech industry, where companies unveil new hardware and showcase emerging ideas. At MWC 2026, Sameer Samat, President of the Android Ecosystem, discussed the evolution of Android, particularly focusing on Android 17, which aims to transition from an operating system to an intelligent system. This version will integrate AI capabilities through Gemini, allowing for more intuitive task management. Android 17 will introduce early agentic capabilities, initially available in a beta feature for select devices, enabling users to automate multi-step tasks. Samat confirmed that Google has no plans to remove sideloading, despite concerns about app security. Upcoming changes to sideloading will focus on verifying app identities to protect users from malicious apps while still allowing power users to install unverified software. He emphasized the importance of balancing openness and safety in the Android platform. Samat expressed excitement about current Android phones, highlighting trends in foldable devices and praising models from brands like Motorola and Nothing for their appeal to younger consumers. He mentioned using a Galaxy Z Fold 7 for work and a Pixel 10 Pro for personal use, noting the beauty of the devices and his preference not to use cases.
AppWizard
March 12, 2026
Cybersecurity researchers have identified six new families of Android malware designed to extract sensitive data and facilitate financial fraud. Notable threats include: - PixRevolution: Targets Brazil's Pix payment platform, activates during Pix transfers, and uses real-time monitoring to intervene in transactions. Victims are tricked into installing malicious apps from counterfeit Google Play Store listings, which enable accessibility services for the malware to capture screens and overlay fake interfaces to reroute funds. - BeatBanker: Spreads through phishing attacks disguised as legitimate Google Play Store pages. It uses an inaudible audio loop for persistence, functions as a banking trojan, and includes a cryptocurrency miner. It creates deceptive overlays for platforms like Binance and Trust Wallet to divert funds and can monitor web browsers and execute remote commands. - TaxiSpy RAT: Exploits accessibility services to gather sensitive information such as SMS messages and call logs, targeting banking and cryptocurrency applications with overlays for credential theft. It employs advanced evasion techniques like native library encryption and real-time remote control. - Mirax: A private malware-as-a-service (MaaS) offering with a subscription model that provides tools for banking overlays and information gathering, including keystrokes and SMS. - Oblivion: Another Android RAT available at a competitive price, featuring capabilities to bypass security measures on various devices. - SURXRAT: Distributed through a Telegram-based MaaS ecosystem, it uses accessibility permissions for persistent control and communicates with a Firebase-based command-and-control infrastructure. Some samples incorporate a large language model component, indicating experimentation with AI by threat actors.
Search