Ad

Google Bans 158,000 Malicious Android App Developer Accounts in 2024


In a major crackdown on cyber threats, Google has announced that it blocked over 2.36 million policy-violating Android apps from being published on the Google Play Store in 2024. Additionally, the tech giant banned more than 158,000 developer accounts attempting to distribute harmful applications, reinforcing its commitment to user security.


Strengthening Android Security Measures

Google's proactive security measures also prevented 1.3 million apps from requesting excessive or unnecessary access to sensitive user data. This achievement was made possible through close collaboration with third-party app developers, ensuring compliance with Android’s privacy policies.


Furthermore, Google Play Protect, the built-in security feature enabled by default on Android devices, identified and flagged 13 million new malicious apps originating from outside the official Play Store. These detections highlight the ongoing battle against malware threats targeting Android users.


Enhanced App Security with Android 13 and Beyond

"As a result of partnering closely with developers, over 91% of app installs on the Google Play Store now utilize the latest Android 13 security protections or newer," said Bethel Otuteye, Khawaja Shams from the Android Security and Privacy Team, and Ron Aquino from Google Play Trust and Safety.


Comparatively, Google had blocked 1.43 million apps in 2022 and 2.28 million in 2023, demonstrating a consistent escalation in security enforcement to protect users from cyber threats.


Play Integrity API and Global Security Initiatives

Google reported an 80% reduction in unauthorized app usage thanks to the widespread adoption of the Play Integrity API. This tool allows developers to verify whether their apps have been tampered with or are running in compromised environments, ensuring enhanced security across the ecosystem.


Additionally, Google has taken steps to automatically block sideloading of potentially unsafe apps in high-risk regions such as Brazil, Hong Kong, India, Kenya, Nigeria, Philippines, Singapore, South Africa, Thailand, and Vietnam. This initiative has protected over 10 million devices, preventing 36 million risky installation attempts across 200,000 unique apps.


New 'Verified' Badge for VPN Apps

To further strengthen security, Google introduced a 'Verified' badge for consumer-facing VPN apps that have successfully passed a Mobile Application Security Assessment (MASA) audit. Originally announced in November 2023, this initiative aims to help users make informed choices and prioritize apps that emphasize privacy and safety.


"This new badge is designed to highlight apps that prioritize user security, helping users make more informed decisions about the VPN services they trust and download," Google stated.


Tria Stealer Malware: A Growing Cyber Threat

Despite Google’s security efforts, cybercriminals continue to evolve their tactics. A recent malware strain dubbed Tria Stealer has been found targeting Android users in Malaysia and Brunei, with campaigns dating back to March 2024.


Tria Stealer is primarily distributed through Telegram and WhatsApp personal and group chats, masquerading as legitimate APK files. Once installed, the malware requests sensitive permissions, allowing it to harvest data from apps such as Gmail, Google Messages, Microsoft Outlook, Samsung Messages, WhatsApp, WhatsApp Business, and Yahoo! Mail.


Security researchers suspect an Indonesian-speaking threat actor is behind the campaign, given the presence of Indonesian language artifacts and Telegram bot naming conventions used for command-and-control (C2) communications.


How Tria Stealer Exploits Users

According to Kaspersky, Tria Stealer is designed to:

  • Exfiltrate SMS data, call logs, and emails.

  • Hijack messaging accounts such as WhatsApp and Telegram.

  • Impersonate victims to request money transfers from contacts.

  • Distribute itself further via malicious APK files.



Alarmingly, the malware’s ability to intercept SMS messages suggests that attackers could steal one-time passwords (OTPs), enabling unauthorized access to banking and other online accounts.


Rising Malware Trends: Connections to UdangaSteal

Researchers note that Tria Stealer shares similarities with another malware family known as UdangaSteal, which targeted users in Indonesia and India throughout 2023 and early 2024. UdangaSteal was distributed using social engineering tactics, such as fake wedding invitations, package delivery scams, and customer support impersonations.


While there is no concrete evidence linking both malware strains to the same threat actor, the parallels suggest that cybercriminals are continuously refining their attack methods to bypass security measures and exploit unsuspecting users.


Final Thoughts

Google’s aggressive stance on app security and developer accountability is a significant step toward reducing cyber threats in the Android ecosystem. However, as seen with Tria Stealer, malware developers are constantly adapting and innovating. This underscores the importance of continuous user awareness, robust security policies, and proactive threat detection.


To stay safe, users should:

  • Avoid sideloading apps from untrusted sources.

  • Regularly update Android devices to benefit from the latest security patches.

  • Enable Google Play Protect for real-time threat detection.

  • Be cautious of suspicious links and APK files shared via messaging apps.


As the battle against mobile malware intensifies, Google's security reinforcements will play a crucial role in safeguarding Android users worldwide.