Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials

Posted on June 16, 2025June 16, 2025 By CWS

A classy phishing operation involving greater than 20 malicious purposes distributed by the Google Play Retailer, particularly designed to steal cryptocurrency pockets credentials from unsuspecting customers. 

The invention, made by Cyble Analysis and Intelligence Labs (CRIL), reveals a coordinated marketing campaign concentrating on well-liked cryptocurrency platforms together with SushiSwap, PancakeSwap, Hyperliquid, and Raydium.

Exploiting Compromised Developer Accounts

The malicious purposes impersonate reputable cryptocurrency wallets and exchanges, using compromised developer accounts that beforehand hosted reputable gaming, video downloader, and reside streaming purposes. 

Malicious utility impersonating Hyperliquid pockets

A few of these accounts had collected over 100,000 downloads earlier than being repurposed for malicious actions, lending credibility to the fraudulent apps and making detection more difficult for customers.

Legit pockets icons utilized by malicious apps

The menace actors employed constant strategies throughout their marketing campaign, together with embedding Command and Management (C&C) URLs inside privateness insurance policies and utilizing comparable bundle naming patterns. 

Regardless of these similarities, the purposes had been distributed beneath totally different developer accounts to keep away from detection. 

The malicious apps utilized bundle names following the sample co.median.android.[random string], resembling co.median.android.pkmxaj for a pretend Pancake Swap utility and co.median.android.ljqjry for a counterfeit Suiet Pockets.

Gaming Developer Account now distributing a malicious Phishing app

Evaluation revealed two major assault methodologies employed by the cybercriminals. The primary kind leveraged the Median framework to quickly convert phishing web sites into Android purposes, with configuration information containing URLs like hxxps://pancakefentfloyd[.]cz/api.php. 

These URLs load phishing interfaces inside WebView parts, prompting customers to enter their 12-word mnemonic phrases to entry fraudulent pockets interfaces.

The second strategy concerned straight loading phishing web sites into WebView with out utilizing improvement frameworks, with malware opening URLs resembling hxxps://piwalletblog[.]weblog to impersonate reputable companies like Raydium pockets. 

Investigation into the infrastructure revealed {that a} single IP tackle (94.156.177[.]209) hosts over 50 phishing domains related to this broader marketing campaign.

The menace actors created an intensive community of fraudulent domains, together with pancakefentfloyd[.]cz, suietsiz[.]cz, hyperliqw[.]sbs, raydifloyd[.]cz, and bullxni[.]sbs, amongst others. 

This centralized infrastructure signifies a well-coordinated operation designed to maximise attain whereas minimizing detection probability.

Excessive Monetary Influence

The marketing campaign poses extreme monetary dangers to cryptocurrency customers, as profitable assaults can lead to irreversible losses since cryptocurrency transactions can’t be simply reversed like conventional banking transactions. 

Upon discovery, CRIL promptly reported the purposes to Google, ensuing within the removing of most malicious apps from the Play Retailer, although some remained energetic on the time of the report.

Safety consultants advocate downloading apps solely from verified builders and punctiliously checking app critiques whereas avoiding purposes requesting delicate data resembling mnemonic phrases. 

Customers ought to allow Google Play Defend on Android gadgets and implement multi-factor authentication wherever potential. Extra protecting measures embrace utilizing respected antivirus software program and enabling biometric safety features like fingerprint or facial recognition.

Dwell Credential Theft Assault Unmask & Instantaneous Protection – Free Webinar

Cyber Security News Tags:Actively, Apps, Attacking, Credentials, Google, Login, Malicious, Play, Steal, Users

Post navigation

Previous Post: Zoomcar Says Hackers Accessed Data of 8.4 Million Users
Next Post: Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data

Related Posts

Hacktivist Groups Attacks on Critical ICS Systems to Steal Sensitive Data Cyber Security News
OpenAI ChatGPT Atlas Browser Jailbroken to Disguise Malicious Prompt as URLs Cyber Security News
Mitigating Malware Threats on Unmanaged Endpoint Devices Cyber Security News
Hackers Accessed Email Account Contains Valid Credentials Cyber Security News
Microsoft Edge for Android Adds InPrivate Tab Locking with PIN & Bio Authentication Cyber Security News
Silver Fox APT Hackers Leveraging Vulnerable Driver to Attack Windows 10 and 11 Systems by Evading EDR/AV Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark