• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Beware of the Viking Horde malware in Google Play Store

By Guest Authors

Security researchers at Check Point have uncovered a new strain of malware in the Google Play Store that has already targeted tens of thousands of Android mobile users.

The malware, called Viking Horde because of a popular app on Google Play that it imitates, is designed to convert mobile devices into a bunch of bots, a network of machines that are controlled by hackers for monetary purposes.

viking-horde

According to the researchers that first discovered the malware on Google’s app marketplace, the malware is hard to remove from a device because it is persistent, meaning it stays on the victim device despite attempts at wiping it off.

The researchers also disclosed the names of apps on Google Play Store that contain the malware, such as the Viking Jump game, which has reached more than a hundred thousand downloads on the app store and has topped the marketplace in specific markets. Other apps infected with the malware are Wi-Fi Plus, Parrot Copter and Memory Booster. These apps have low ratings on Google Play Store, perhaps because users noticed that those apps had asked for extra permits such as root privileges when they tried to download and install the games and apps.

Once installed, however, the app that contains the malware will have access to some features of a device that could allow attackers to steal personal information. In other instances, users reported that they were receiving premium text messages and even get a flood of SMS in what is believed to be a distributed denial-of-service attack. Yes, it can happen on mobile devices, too.

The malware is extra harmful to rooted Android devices as it downloads more malicious components into the phone that will make it difficult for antivirus software to remove the malware. Worst, attackers will be able to execute code remotely using the malware.

Unknown to the owner of the infected device, the malware unloads several of its components as the app initiates the game, for gaming apps. If the device is not rooted, the malicious components are installed in the SD card. The malware also checks of the device is rooted so that it can perform escalated privileges. The malware then establishes a proxy connection to enable remote code execution.

The infected apps still sit on Google Play Store as of this writing, and the search giant has yet to address the situation. The botnet appears to be coming from various countries such as Russia, Spain, Mexico and the United States.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

DYMESTY AI Glasses Review – Could These Be Your Next Wearable?

Mammotion LUBA 2 AWD 5000HX Review – Premium Robot Lawn Mower for Large, Complex Lawns

Provirtec Air Purifier AP-02 Review – Good For Large Rooms?

LaserPecker LP5 Laser Engraver Review: A Portable Powerhouse with Potential

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • How I Secure and Protect My Giant Halloween Decorations from Wind Gust
  • LLM Integration Is Overthrowing the Big Tech Monopoly in Wearables
  • The Best Affordable Hollusion Projection Material for AtmosFX Halloween Decorations
  • DYMESTY AI Glasses Review – Could These Be Your Next Wearable?

Copyright © 2025 · All Rights Reserved