The developers of 210 mobile applications found on the Google Play Store were apparently tricked into building their programs using a malicious software developer kit that secretly implanted adware in their apps.
The apps, many of which were packaged as driving or racing simulator games, were downloaded nearly 150 million times by Android device users, according to a new blog post from researchers at Check Point Software Technologies.
Dubbed SimBad, the adware was discovered within the RXDrioder Software Development Kit, which bills itself as an ad-related SDK. "We believe the developers were scammed to use this malicious SDK, unaware of its content, leading to the fact that this campaign was not targeting a specific county or developed by the same developer," according to a company blog post written by researchers Elena Root and Andrey Polkovnichenko.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.