Malicious App on Google Play With 50K+ Downloads Steals Credentials and Pushes Ads

Related

Apache Syncope Vulnerability Lets Attackers Hijack User Sessions

What happened A critical XML External Entity (XXE) vulnerability in...

Malicious App on Google Play With 50K+ Downloads Steals Credentials and Pushes Ads

What happened Zscaler ThreatLabz identified a malicious Android app hosted...

Hikvision Wireless Access Points Vulnerability Enables Malicious Command Execution

What happened A high-severity vulnerability in Hikvision wireless access points...

OpenClaw AI Agent Skills Abused to Conduct Credential Stuffing and Profile Hijacking

What happened Security researchers at VirusTotal have identified malicious use...

Share

What happened

Zscaler ThreatLabz identified a malicious Android app hosted on the Google Play Store that had been downloaded more than 50,000 times was found stealing credentials and serving unauthorized ads. According to the report, the application, disguised as a simple utility, contained hidden code that captured user credentials entered into login fields and then relayed that data to remote command-and-control infrastructure. In addition to credential theft, the app displayed intrusive ads outside its advertised functionality, generating ad revenue for its operators while degrading user experience. Google removed the app from the Play Store after researchers identified the malicious behavior, but by that point it had already surpassed 50,000 downloads. The incident highlights how seemingly legitimate applications with high download counts can nevertheless embed harmful functionalities that evade initial store screening.

Who is affected

Android device users who downloaded and installed the malicious app from the Google Play Store are affected through unauthorized credential capture and intrusive advertising behavior.

Why CISOs should care

The incident demonstrates ongoing risk from supply-chain abuse via trusted app ecosystems where high-download applications can harbor hidden malicious logic, threatening user privacy and credential security in enterprise mobile environments.

3 practical actions

  • Audit installed Google Play apps. Review installed Android applications for unauthorized credential access behavior.
  • Monitor for unusual ad activity. Detect mobile devices generating abnormal ad impressions outside expected app use.
  • Educate users on app permissions. Reinforce caution around apps with unnecessary access to login interfaces.