• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Do Not Sell My Personal Information
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech News
  • Tech Guide
  • Gadget & Apps

Beware of the Viking Horde malware in Google Play Store

Updated on May 10, 2016 by Guest Authors

Security researchers at Check Point have uncovered a new strain of malware in the Google Play Store that has already targeted tens of thousands of Android mobile users.

The malware, called Viking Horde because of a popular app on Google Play that it imitates, is designed to convert mobile devices into a bunch of bots, a network of machines that are controlled by hackers for monetary purposes.

viking-horde

According to the researchers that first discovered the malware on Google’s app marketplace, the malware is hard to remove from a device because it is persistent, meaning it stays on the victim device despite attempts at wiping it off.

The researchers also disclosed the names of apps on Google Play Store that contain the malware, such as the Viking Jump game, which has reached more than a hundred thousand downloads on the app store and has topped the marketplace in specific markets. Other apps infected with the malware are Wi-Fi Plus, Parrot Copter and Memory Booster. These apps have low ratings on Google Play Store, perhaps because users noticed that those apps had asked for extra permits such as root privileges when they tried to download and install the games and apps.

Once installed, however, the app that contains the malware will have access to some features of a device that could allow attackers to steal personal information. In other instances, users reported that they were receiving premium text messages and even get a flood of SMS in what is believed to be a distributed denial-of-service attack. Yes, it can happen on mobile devices, too.

The malware is extra harmful to rooted Android devices as it downloads more malicious components into the phone that will make it difficult for antivirus software to remove the malware. Worst, attackers will be able to execute code remotely using the malware.

Unknown to the owner of the infected device, the malware unloads several of its components as the app initiates the game, for gaming apps. If the device is not rooted, the malicious components are installed in the SD card. The malware also checks of the device is rooted so that it can perform escalated privileges. The malware then establishes a proxy connection to enable remote code execution.

The infected apps still sit on Google Play Store as of this writing, and the search giant has yet to address the situation. The botnet appears to be coming from various countries such as Russia, Spain, Mexico and the United States.

Disclosure: As an Amazon Associate, I earn from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

SwitchBot Curtain Smart Electric Motor Review – The Upgraded Version

COLORWING M08F Portable Thermal Printer Review – Requiring No Ink, Toner, or Ribbon

Shunzao S9 Cordless Stick Vacuum Cleaner Review

EKSA H6 Wireless Headset with ENC Microphone Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • BLUETTI EB3A Power Station – Ultra-Portable with 268Wh Capacity and 600W Inverter
  • BOB AND BRAD Q2 Mini Massage Gun – For On-the-go Usage
  • Bob and Brad C2 Massage Gun – The Best Features
  • SwitchBot Curtain Smart Electric Motor Review – The Upgraded Version

Copyright © 2022 · All Rights Reserved