third-party app store

AppWizard
November 18, 2025
Google is introducing support for "Registered App Stores" with the upcoming Android 17 release, following a legal settlement with Epic Games. This initiative aims to simplify the installation process for competing app marketplaces on Android devices by allowing a single-tap installation for certified third-party app stores. Users will see a unified installation method with clear information about the store's registration status and permissions required for installation. Google has also committed to preventing hardware partners from imposing restrictive warning screens that could complicate this process. The changes are a result of the Epic v. Google legal dispute, and Google plans to implement these enhancements by the end of 2026.
BetaBeacon
November 6, 2025
Google and Epic Games have reached an agreement in their antitrust dispute, proposing new rules for Android and Google Play. The plan allows developers to accept payments through their own systems within apps, sets maximum fees for transactions, and establishes fair criteria for third-party app store access. The agreement aims to provide developers with more options and lower fees while ensuring user safety. The proposed changes will primarily apply to new app installations.
AppWizard
November 5, 2025
Google has proposed modifications to the Play Store following its legal defeat against Epic Games. The proposal includes easier access to third-party app stores, a new tiered service fee structure (9% for general purchases and 20% for certain transactions), reduced Google Play Billing fees (5% for the first million in annual revenue, reverting to 30% thereafter), permission for apps to display alternative payment options, and the ability to install a Registered App Store directly from a website. These changes will be discussed in court on November 6. Certain restrictions remain, such as prohibiting exclusive deals for Play Store access and allowing developers to communicate pricing options outside the Play Store.
AppWizard
October 23, 2025
OpenAI's app Sora, launched in late September, is currently the No. 1 app in the U.S. and Canada, with around 2 million downloads. Upcoming updates include new video editing tools, the ability to create character "cameos" of pets and objects, and improved social features. The Android version of the app is expected to launch soon. The cameo feature allows users to create AI personas from video references, which can be shared and used in collaborative videos. The user interface will be updated to show trending cameos, and basic video editing capabilities will be introduced. OpenAI is also working on user feedback regarding moderation and app performance. Sora is currently available for pre-registration on the Google Play Store, but a specific launch date for the Android version has not been announced.
AppWizard
May 12, 2025
The Kaleidoscope attack is an ad-fraud scheme targeting Android users by tricking them into downloading malicious versions of legitimate apps, primarily via third-party app stores. Approximately 2.5 million devices are infected each month, with notable occurrences in India, Indonesia, the Philippines, and Brazil. Users are advised to uninstall suspicious apps and avoid downloading from unverified sources to protect their devices.
AppWizard
March 14, 2025
A new Android spyware called KoSpy has been linked to North Korean threat actors, specifically the group APT37 (ScarCruft), and has infiltrated Google Play and APKPure through malicious applications. The campaign has been active since March 2022, targeting Korean and English-speaking users with apps disguised as file managers, security tools, and software updaters. Five identified applications involved are: 휴대폰 관리자 (Phone Manager), File Manager (com.file.exploer), 스마트 관리자 (Smart Manager), 카카오 보안 (Kakao Security), and Software Update Utility. KoSpy retrieves an encrypted configuration file from a Firebase Firestore database and connects to a command and control (C2) server, allowing it to evade detection. Its data collection capabilities include intercepting SMS and call logs, real-time GPS tracking, reading files, using the microphone and camera, taking screenshots, and recording keystrokes. Each application operates with a distinct Firebase project and C2 server for data exfiltration, with data encrypted using a hardcoded AES key. Although the spyware apps have been removed, users are advised to manually uninstall them and use security tools to eliminate any remnants. Google Play Protect can block known malicious apps, and all identified KoSpy applications have been removed from Google Play.
AppWizard
March 12, 2025
Malware, specifically a new spyware variant called KoSpy, has been linked to a North Korean hacking group known as ScarCruft (APT37). Researchers at Lookout Threat Lab discovered KoSpy concealed within deceptive applications like file managers and security software. Once installed, it can extract sensitive information such as SMS messages, call logs, device location, and access files. It can also record audio and video, capture screenshots, and log keystrokes. The data collected is transmitted to Command and Control servers encrypted with a hardcoded AES key and utilizes Firebase Firestore for configuration data. At least one malicious application associated with KoSpy was found on the Google Play Store, downloaded over ten times, and similar apps were also on third-party app store APKPure. Google has since removed the identified applications and deactivated the related Firebase projects.
AppWizard
March 12, 2025
A report from cybersecurity firm Lookout reveals that North Korean hackers have uploaded Android spyware, named KoSpy, onto the Google Play app store, which has been downloaded over ten times. The spyware masquerades as a file manager and is designed for surveillance, collecting data such as SMS messages, call logs, device location, files, keystrokes, Wi-Fi details, installed apps, audio recordings, images, and screenshots. Google has removed the identified apps from the Play Store and deactivated associated Firebase projects. Lookout also found instances of KoSpy on the third-party app store APKPure. The campaign appears targeted at individuals in South Korea who speak English or Korean, with links to North Korean hacking groups APT37 and APT43.
Search