Malicious Google Play Apps Infect 330K Android Devices

Malicious Apps on Google Play

In the city of New Delhi, researchers have discovered a concerning Android backdoor called ‘Xamalicious’. This backdoor has managed to infect a significant number of devices, around 338,300, through malicious apps found on Google Play.

According to Bleeping Computer, McAfee, a company specializing in computer security software, recently uncovered a total of 14 infected apps on Google Play. Surprisingly, three of these apps had managed to accumulate an impressive 100,000 installs each.

Even though the apps have been taken down from Google Play, users who downloaded them since mid-2020 might still have Xamalicious infections on their phones. These infections need to be manually cleaned up and scanned.

Some of the most well-liked apps from Xamalicious are Essential Horoscope for Android with 100,000 installs, 3D Skin Editor for PE Minecraft with 100,000 installs, Logo Maker Pro with 100,000 installs, Auto Click Repeater with 10,000 installs, Count Easy Calorie Calculator with 10,000 installs, Dots: One Line Connector with 10,000 installs, and Sound Volume Extender with 5,000 installs.

Furthermore, a specific set of 12 harmful applications containing the Xamalicious threat are being spread through unauthorized third-party app stores. These apps infect users by downloading APK (Android package) files, as stated in the report.

Based on McAfee telemetry data, a significant number of infections were found on devices located in the United States, Germany, Spain, the UK, Australia, Brazil, Mexico, and Argentina.

Xamalicious is a backdoor that targets Android devices. It is designed to be hidden within apps built using the Xamarin framework, making it harder to detect through code analysis.

Upon installation, the app requests Accessibility Service access, which enables it to carry out privileged operations like navigation gestures, hiding on-screen objects, and granting additional permissions.

After being installed, it establishes a connection with the C2 server to obtain the second-stage DLL payload (‘cache.bin’) if specific criteria related to geography, network, device configuration, and root status are satisfied.


Subscribe to Our Newsletter

Related Articles

Top Trending

On This Day March 30
On This Day March 30: History, Famous Birthdays, Deaths & Global Events
Capital gains tax Canada
17 Key Facts About Capital Gains Tax in Canada
AI Bias
The Rise of AI Bias: Why It Matters To Everyday Consumers
The Basics of Inventory Management for Growing Businesses
Streamline Profits with The Basics Of Inventory Management for Growing Businesses
Critical Minerals Developing Nations
The Minerals That Could Change Everything — If the Developing World Acts Now

Fintech & Finance

Ai In Financial Services
How AI Is Making Financial Services More Accessible: Unlocking Opportunities
crypto remittances New Zealand
17 Critical Facts About How New Zealanders Are Using Crypto for International Remittances
Smart Contracts
Smart Contracts Explained: Real-World Applications Beyond Crypto
Tokenization Of Real-World Assets
Tokenization Of Real-World Assets: The Next Big Crypto Trend!
how to spot Crypto Scam
How to Spot a Crypto Scam Before It's Too Late: Protect Your Investment!

Sustainability & Living

Green Building Certifications For Schools
Green Building Certifications For Schools: Boost Learning Environments!
Smart Water Management
Revolutionize Smart Water Management In Cities: Unlock the Future!
Homesteading’s Comeback Story, Why Americans Are Turning Back To Self Reliance In Record Numbers
Homesteading’s Comeback Story: Why Americans are Turning Back to Self Reliance In Record Numbers
Direct Air Capture_ The Machines Sucking CO2
Meet the Future with Direct Air Capture: Machines Sucking CO2!
Microgrid Energy Resilience
Embracing Microgrids: Decentralizing Energy For Resilience [Revolutionize Your World]

GAMING

Geek Appeal of Randomized Games
The Geek Appeal of Randomized Games Like Pokies
Best Way to Play Arknights on PC
The Best Way to Play Arknights on PC - Beginner’s Guide for Emulators
Cybet Review
Cybet Review: A Fast-Growing Crypto Casino with Fast Withdrawals and No-KYC Gaming
online gaming
Why Sign-Up Bonuses Are So Popular in Online Entertainment
How Online Gaming Platforms Build Trust
How Online Gaming Platforms Build Trust With New Users

Business & Marketing

The Basics of Inventory Management for Growing Businesses
Streamline Profits with The Basics Of Inventory Management for Growing Businesses
Vendor Negotiation Strategies to Cut Costs Fast
How to Negotiate Better Deals With Vendors
Strategic Sourcing vs Tactical Purchasing Key Differences
Strategic Sourcing Vs Tactical Purchasing: Key Differences
How AI Is Transforming Procurement and Sourcing
How AI Is Transforming Procurement and Sourcing
Top Procurement Software Platforms Compared
Top Procurement Software Platforms Compared

Technology & AI

AI Bias
The Rise of AI Bias: Why It Matters To Everyday Consumers
AI Voice Assistants
How AI Voice Assistants Are Getting Smarter Every Year?
AI In Entertainment
AI In Entertainment: How Algorithms Decide What You Watch
Ai In Financial Services
How AI Is Making Financial Services More Accessible: Unlocking Opportunities
How AI Is Transforming Procurement and Sourcing
How AI Is Transforming Procurement and Sourcing

Fitness & Wellness

Regenerative Baseline
Regenerative Baseline: The 2026 Mandatory Standard for Organic Luxury [Part 5]
Purposeful Walk Spaziergang
Mastering the Spaziergang: How a Purposeful Walk Can Reset Your Entire Week
Avtub
Avtub: The Ultimate Hub For Lifestyle, Health, Wellness, And More
Integrated Value Chain
The Resilience Framework: A Collaborative Integrated Value Chain Is Changing the Way We Eat [Part 4]
Nutrient Density Scoring
Beyond the Weight: Why Nutrient Density Scoring is the New Gold Standard for Food Value in 2026 [Part 3]