Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials

Posted on June 16, 2025June 16, 2025 By CWS

A classy phishing operation involving greater than 20 malicious purposes distributed by the Google Play Retailer, particularly designed to steal cryptocurrency pockets credentials from unsuspecting customers. 

The invention, made by Cyble Analysis and Intelligence Labs (CRIL), reveals a coordinated marketing campaign concentrating on well-liked cryptocurrency platforms together with SushiSwap, PancakeSwap, Hyperliquid, and Raydium.

Exploiting Compromised Developer Accounts

The malicious purposes impersonate reputable cryptocurrency wallets and exchanges, using compromised developer accounts that beforehand hosted reputable gaming, video downloader, and reside streaming purposes. 

Malicious utility impersonating Hyperliquid pockets

A few of these accounts had collected over 100,000 downloads earlier than being repurposed for malicious actions, lending credibility to the fraudulent apps and making detection more difficult for customers.

Legit pockets icons utilized by malicious apps

The menace actors employed constant strategies throughout their marketing campaign, together with embedding Command and Management (C&C) URLs inside privateness insurance policies and utilizing comparable bundle naming patterns. 

Regardless of these similarities, the purposes had been distributed beneath totally different developer accounts to keep away from detection. 

The malicious apps utilized bundle names following the sample co.median.android.[random string], resembling co.median.android.pkmxaj for a pretend Pancake Swap utility and co.median.android.ljqjry for a counterfeit Suiet Pockets.

Gaming Developer Account now distributing a malicious Phishing app

Evaluation revealed two major assault methodologies employed by the cybercriminals. The primary kind leveraged the Median framework to quickly convert phishing web sites into Android purposes, with configuration information containing URLs like hxxps://pancakefentfloyd[.]cz/api.php. 

These URLs load phishing interfaces inside WebView parts, prompting customers to enter their 12-word mnemonic phrases to entry fraudulent pockets interfaces.

The second strategy concerned straight loading phishing web sites into WebView with out utilizing improvement frameworks, with malware opening URLs resembling hxxps://piwalletblog[.]weblog to impersonate reputable companies like Raydium pockets. 

Investigation into the infrastructure revealed {that a} single IP tackle (94.156.177[.]209) hosts over 50 phishing domains related to this broader marketing campaign.

The menace actors created an intensive community of fraudulent domains, together with pancakefentfloyd[.]cz, suietsiz[.]cz, hyperliqw[.]sbs, raydifloyd[.]cz, and bullxni[.]sbs, amongst others. 

This centralized infrastructure signifies a well-coordinated operation designed to maximise attain whereas minimizing detection probability.

Excessive Monetary Influence

The marketing campaign poses extreme monetary dangers to cryptocurrency customers, as profitable assaults can lead to irreversible losses since cryptocurrency transactions can’t be simply reversed like conventional banking transactions. 

Upon discovery, CRIL promptly reported the purposes to Google, ensuing within the removing of most malicious apps from the Play Retailer, although some remained energetic on the time of the report.

Safety consultants advocate downloading apps solely from verified builders and punctiliously checking app critiques whereas avoiding purposes requesting delicate data resembling mnemonic phrases. 

Customers ought to allow Google Play Defend on Android gadgets and implement multi-factor authentication wherever potential. Extra protecting measures embrace utilizing respected antivirus software program and enabling biometric safety features like fingerprint or facial recognition.

Dwell Credential Theft Assault Unmask & Instantaneous Protection – Free Webinar

Cyber Security News Tags:Actively, Apps, Attacking, Credentials, Google, Login, Malicious, Play, Steal, Users

Post navigation

Previous Post: Zoomcar Says Hackers Accessed Data of 8.4 Million Users
Next Post: Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data

Related Posts

Earth Ammit Hackers Attacking Using New Tools to Attack Drones Used in Military Sectors Cyber Security News
Trend Micro Apex One Vulnerability Allow Attackers to Inject Malicious Code Cyber Security News
Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number Cyber Security News
CefSharp Enumeration Tool Reveals Security Vulnerabilities in .NET Desktop Apps Cyber Security News
Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
Windows Common Log File System 0-Day Vulnerability Actively Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • In Other News: Hacker Helps Kill Informants, Crylock Developer Sentenced, Ransomware Negotiator Probed
  • Critical HIKVISION ApplyCT Vulnerability Exposes Devices to Code Execution Attacks
  • Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks
  • Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News