Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

20+ Malicious Apps on Google Play Actively Attacking Users to Steal Login Credentials

Posted on June 16, 2025June 16, 2025 By CWS

A classy phishing operation involving greater than 20 malicious purposes distributed by the Google Play Retailer, particularly designed to steal cryptocurrency pockets credentials from unsuspecting customers. 

The invention, made by Cyble Analysis and Intelligence Labs (CRIL), reveals a coordinated marketing campaign concentrating on well-liked cryptocurrency platforms together with SushiSwap, PancakeSwap, Hyperliquid, and Raydium.

Exploiting Compromised Developer Accounts

The malicious purposes impersonate reputable cryptocurrency wallets and exchanges, using compromised developer accounts that beforehand hosted reputable gaming, video downloader, and reside streaming purposes. 

Malicious utility impersonating Hyperliquid pockets

A few of these accounts had collected over 100,000 downloads earlier than being repurposed for malicious actions, lending credibility to the fraudulent apps and making detection more difficult for customers.

Legit pockets icons utilized by malicious apps

The menace actors employed constant strategies throughout their marketing campaign, together with embedding Command and Management (C&C) URLs inside privateness insurance policies and utilizing comparable bundle naming patterns. 

Regardless of these similarities, the purposes had been distributed beneath totally different developer accounts to keep away from detection. 

The malicious apps utilized bundle names following the sample co.median.android.[random string], resembling co.median.android.pkmxaj for a pretend Pancake Swap utility and co.median.android.ljqjry for a counterfeit Suiet Pockets.

Gaming Developer Account now distributing a malicious Phishing app

Evaluation revealed two major assault methodologies employed by the cybercriminals. The primary kind leveraged the Median framework to quickly convert phishing web sites into Android purposes, with configuration information containing URLs like hxxps://pancakefentfloyd[.]cz/api.php. 

These URLs load phishing interfaces inside WebView parts, prompting customers to enter their 12-word mnemonic phrases to entry fraudulent pockets interfaces.

The second strategy concerned straight loading phishing web sites into WebView with out utilizing improvement frameworks, with malware opening URLs resembling hxxps://piwalletblog[.]weblog to impersonate reputable companies like Raydium pockets. 

Investigation into the infrastructure revealed {that a} single IP tackle (94.156.177[.]209) hosts over 50 phishing domains related to this broader marketing campaign.

The menace actors created an intensive community of fraudulent domains, together with pancakefentfloyd[.]cz, suietsiz[.]cz, hyperliqw[.]sbs, raydifloyd[.]cz, and bullxni[.]sbs, amongst others. 

This centralized infrastructure signifies a well-coordinated operation designed to maximise attain whereas minimizing detection probability.

Excessive Monetary Influence

The marketing campaign poses extreme monetary dangers to cryptocurrency customers, as profitable assaults can lead to irreversible losses since cryptocurrency transactions can’t be simply reversed like conventional banking transactions. 

Upon discovery, CRIL promptly reported the purposes to Google, ensuing within the removing of most malicious apps from the Play Retailer, although some remained energetic on the time of the report.

Safety consultants advocate downloading apps solely from verified builders and punctiliously checking app critiques whereas avoiding purposes requesting delicate data resembling mnemonic phrases. 

Customers ought to allow Google Play Defend on Android gadgets and implement multi-factor authentication wherever potential. Extra protecting measures embrace utilizing respected antivirus software program and enabling biometric safety features like fingerprint or facial recognition.

Dwell Credential Theft Assault Unmask & Instantaneous Protection – Free Webinar

Cyber Security News Tags:Actively, Apps, Attacking, Credentials, Google, Login, Malicious, Play, Steal, Users

Post navigation

Previous Post: Zoomcar Says Hackers Accessed Data of 8.4 Million Users
Next Post: Hackers Upload Weaponized Packages to PyPI Repositories to Steal AWS, CI/CD and macOS Data

Related Posts

Cisco Webex Meetings Vulnerability Let Attackers Manipulate HTTP Responses Cyber Security News
Critical ScreenConnect Vulnerability Let Attackers Expose Sensitive Configuration Data Cyber Security News
Let’s Encrypt Unveils new “Generation Y” root and to 45 day certificates Cyber Security News
Scaly Wolf Attacking Organizations to Uncover Organizations’ Secrets Cyber Security News
Patch for Code Execution Vulnerabilities in Endpoint Manager Cyber Security News
Weaponized Google Calendar Invites Delivers Malicious Payload With Just One Character Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark