Cybercriminals offering services to add malicious apps to Google Play

April 12, 2023

A new report by Kaspersky reveals that malware developers have created a thriving market for adding malicious Android apps to Google Play. The services, which cost anywhere between $2,000 to $20,000 depending on the type of malicious behavior requested by cybercriminals, are offered via Telegram, dark web marketplaces, and hacking forums that allow threat actors to promote their services.

Malware developers promise to hide malware in legitimate-looking apps that impersonate antivirus programs, cryptocurrency asset managers, QR-code scanners, small games, and dating apps. The malicious but innocuous-looking apps are published on Google Play but include the ability to fetch malicious code via a later update.

Kaspersky reports that apart from Google Play loaders, which sell for an average of roughly $7,000, cybercriminals also sell services like malware obfuscation for $8 to $30 or “clean” Google developer accounts that cost $60. These services guarantee that the app will remain on Google Play for at least one week, with some developers promising at least 5,000 installs.

Upon installation, the malware loader apps request the user to grant risky permissions like access to the phone’s camera, microphone, or Accessibility Services, and prevent access to the app’s main functions until the requests are approved.

To promote these loaders, the sellers publish videos showcasing their features, user-friendly interface, granular targeting filters, and more. “Cybercriminals may also supplement the trojanized app with functionality for detecting a debugger or sandbox environment,” explains Kaspersky.

To defend against these stealthy attacks, Android users should carefully review the requested permissions upon app installation, check user comments on Google Play, and keep the number of installed apps at a minimum. Even more important, users should never install Android APKs from third-party sites, as they are a common distribution method for malware.

The sources for this piece include an article in BleepingComputer.

Top Stories

Related Articles

January 16, 2026 A newly uncovered malware framework suggests attackers are quietly preparing for a much deeper push into Linux more...

January 16, 2026 A massive trove of personal data belonging to thousands of U.S. immigration agents has reportedly been leaked more...

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn