News > Internet & Security Google Play Store Could Still Be Serving Up Dangerous Shape-Shifting Apps And they disappear, too! By Mayank Sharma Mayank Sharma Twitter Freelance Tech News Reporter Writer, Reviewer, Reporter with decades of experience of breaking down complex tech, and getting behind the news to help readers get to grips with the latest buzzwords. lifewire's editorial guidelines Published on August 19, 2022 10:56AM EDT Fact checked by Jerri Ledford Fact checked by Jerri Ledford Western Kentucky University Gulf Coast Community College Jerri L. Ledford has been writing, editing, and fact-checking tech stories since 1994. Her work has appeared in Computerworld, PC Magazine, Information Today, and many others. lifewire's fact checking process Tweet Share Email Tweet Share Email Internet & Security Mobile Phones Internet & Security Computers & Tablets Smart Life Tech Leaders Home Theater & Entertainment Software & Apps Social Media Streaming Gaming Women in Gaming Bitdefender has identified almost three dozen apps that masquerade as useful utilities and then employ tricks to make themselves invisible to prevent uninstallation.The apps change their names and icons to something innocuous and then serve intrusive advertisements.While they currently just display ads, Bitdefender suggests they can be made to serve more dangerous malware. Westend61 /Getty Images Hackers have once again gotten past Google's defenses and managed to list malware apps on the Play Store by pulling a switch-up. Researchers from Bitdefender have shared details about dozens of apps on the Google Play Store that camouflage themselves behind false pretenses and then hide their presence once installed using several tricks, including changing their names and icons. "Sadly, the findings are not surprising at all," Dr. Johannes Ullrich, Dean of Research at SANS Technology Institute, told Lifewire in an email interview. "The Google Play store has frequent problems identifying and eliminating malicious apps." Pulling a Fast One Commenting on the modus operandi of the apps, Bitdefender said the apps trick users into installing them by pretending to offer specialized functionality, like a location finder or a camera app with filters. But immediately after installation, the apps change their name and icon, which makes them virtually impossible to find and uninstall. To hide in plain sight, some apps change their name to Settings and their logo to the gears icon usually associated with the Settings app. When clicked, the apps launch the actual Settings app of the phone to complete their deception successfully. This way, most users cannot find the actual malicious app they just installed. DenkCreative / Getty Images In the background, though, the apps will begin spewing intrusive advertisements. Interestingly, the apps use yet another trick to ensure they don't show in the list of the most recently used apps on Android. "Bad actors will always try to deploy tampered or cloned apps for many reasons: to inject malware, disrupt financial transactions, divert advertising revenue, or simply to steal data," George McGregor, VP at mobile app protection experts Approov, told Lifewire via email. While the apps identified in the research are known as adware, since all they serve is irritating advertisements, Bitdefender says those apps can just as easily fetch and serve a more dangerous type of malware. "While all of the detected apps are clearly malicious, the developers were able to upload them to the Google Play Store, offer them to users and even push updates that made the apps better at hiding on devices," said Bitdefender. Despite the fact that Google hasn't been able to completely stop such fake apps from being available on the Play Store, McGregor said people shouldn't go to a third-party app store. The Google Play store has frequent problems identifying and eliminating malicious apps. Dr. Ullrich agreed. "Users are still better off limiting downloads to the Google Play store," he said. "But they need to understand that the Google approval process is not very robust." Less Is More The 35 malicious apps Bitdefender has identified as part of their research have download counts ranging from 10,000 to 100,000 and have clocked over two million downloads between them. Bitdefender told Lifewire over email that it had informed Google about the malicious apps before it was published. Surprisingly, as of August 18, most if not all apps were still available for download. To avoid becoming a victim of these fraudulent apps, Bitdefender suggests carefully examining their requested permissions. For instance, any app that requests the ability to draw over other apps should be subject to further tests. Listing several parameters to judge an app's genuineness, Dr. Ullrich recommends examining the date the app was uploaded since apps that have been listed for a while are less likely to be malicious. "Do not install too many apps," said Dr. Ullrich. "Discard apps you haven't used in a while or do not even remember what they do." Approaching the issue from a different perspective, McGregor pointed out that there are tools for app attestation that can completely prevent apps from being cloned or modified, ensuring that only a genuine copy of the app is allowed to run and access data. "Some individual app developers protect their apps in this way already," said McGregor. "But it may be in the interests of Google to require that such app attestation be in place for any app deployed on the Play Store." Was this page helpful? Thanks for letting us know! Get the Latest Tech News Delivered Every Day Subscribe Tell us why! Other Not enough details Hard to understand Submit