{"id":3309,"date":"2020-11-02T08:03:00","date_gmt":"2020-11-02T07:03:00","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=3309"},"modified":"2023-08-16T13:24:40","modified_gmt":"2023-08-16T11:24:40","slug":"hiddenads-malware-does-manage-to-slip-into-google-play-again","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/","title":{"rendered":"HiddenAds malware does manage to slip into Google Play&#8230; again"},"content":{"rendered":"\n<p>Google continues to struggle with keeping bad apps off Play marketplace. This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million&#8230; Yes, definitely &#8211; Google is still struggling with its marketplace security. <\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"21-malicious-apps-downloaded-8-million-times-from-google-play\"><strong>21 Malicious Apps Downloaded 8 Million Times From Google Play<\/strong><\/h2>\n\n\n<p>Despite Google\u2019s best efforts to keep Android users safe, malware does manage to slip into Google Play from time to time, and the 21 malicious apps that Avast identified recently are proof of that. Google has already removed 15 of them.&nbsp;<\/p>\n\n\n\n<p>Catered for gamers, the apps were found to include adware that is part of the HiddenAds family. The offending applications appear to have been downloaded roughly 8 million times before being discovered.&nbsp;<\/p>\n\n\n\n<p>The HiddenAds malware, Avast explains, poses as fun or useful apps but in reality delivers intrusive ads outside the application. Often, the malware would make detection difficult by hiding behind relevant-looking advertisements and would attempt to prevent removal by hiding icons.<\/p>\n\n\n\n<p>In this case, the threat was disguised as games promising to provide users with highly engaging actions.<\/p>\n\n\n\n<p>To stay protected, users are advised to always double-check any application they want to download and install on their devices, even those listed in Google Play. Checking the app\u2019s reviews, price, and ratings in the store and paying attention to the requested permissions should help users identify suspicious apps.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.securityweek.com\/21-malicious-apps-downloaded-8-million-times-google-play\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"kashmirblack-botnet-behind-attacks-on-cmss-like-wordpress-joomla-drupal-others\"><strong>KashmirBlack botnet behind attacks on CMSs like WordPress, Joomla, Drupal, others<\/strong><\/h2>\n\n\n<p>A highly sophisticated botnet is believed to have infected hundreds of thousands of websites by attacking their underlying content management system (CMS) platforms. Named KashmirBlack, the botnet started operating in November 2019.<\/p>\n\n\n\n<p>Security researchers from Imperva who analyzed the botnet said its primary purpose appears to be to infect websites and then use their servers for cryptocurrency mining, redirecting a site&#8217;s legitimate traffic to spam pages, and to a lesser degree, showing web defacements.<\/p>\n\n\n\n<p>The botnet started out small, but after months, it has evolved into a sophisticated behemoth capable of attacking thousands of sites per day. Nowadays, KashmirBlack is &#8222;managed by one C&amp;C (Command and Control) server and uses more than 60 \u2013 mostly innocent surrogate \u2013 servers as part of its infrastructure,&#8221; Imperva said. \u201cIt handles hundreds of bots, each communicating with the C&amp;C to receive new targets, perform brute force attacks, install backdoors, and expand the size of the botnet.&#8221;<\/p>\n\n\n\n<p>KashmirBlack expands by scanning the internet for sites using outdated software and then using exploits for known vulnerabilities to infect the site and its underlying server.&nbsp;<\/p>\n\n\n\n<p>The exploits allowed KashmirBlack operators to attack sites running CMS platforms like WordPress, Joomla!, PrestaShop, Magneto, Drupal, vBulletin, osCommerce, OpenCart, and Yeager. Some exploits attacked the CMS itself, while others attacked some of their inner components and libraries.<\/p>\n\n\n\n<p>Based on multiple clues it found, Imperva researchers said they believed the botnet was the work of a hacker named Exect1337, a member of the Indonesian hacker crew PhantomGhost.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.zdnet.com\/article\/kashmirblack-botnet-behind-attacks-on-cmss-like-wordpress-joomla-drupal-others\/#ftag=RSSbaffb68\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"there-is-a-new-trickbot-linux-variant-deployed-in-the-wild\"><strong>There is a new TrickBot Linux variant deployed in the wild<\/strong><\/h2>\n\n\n<p>No longer than two weeks ago a joined forces of Microsoft\u2019s Defender team, FS-ISAC, ESET, Lumen\u2019s Black Lotus Labs, NTT, and Broadcom\u2019s cyber-security division Symantec tried to take down the command and control infrastructure of the TrickBot botnet.<\/p>\n\n\n\n<p>Microsoft has taken down:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>120 of the 128 servers that were composing the Trickbot infrastructure.<\/li><li>62 of the original 69 TrickBot C&amp;C servers &#8211; seven servers that could not be brought down were Internet of Things devices.<\/li><li>And after the botnet operators tried to resume the operations, MS brought down 58 of the 59 servers the operators attempted to bring online.<\/li><\/ol>\n\n\n\n<p>But according to the newest report published by Netscout, TrickBot\u2019s operators have started to use a new variant of their malware in an attempt to Linux systems and expand the list of its targets.<\/p>\n\n\n\n<p>Researchers analysed the communication flow between the bot and the C2 server. The client sends \u201cc2_command 0\u201d to the server along with information about the compromised system and the bot ID, the server, in turn, responds with the message \u201csignal \/1\/\u201d back to the bot. The infected host responds by sending the same message back to the C2, which in turn sends the command to be executed by the bot.<\/p>\n\n\n\n<p class=\"has-light-gray-background-color has-background\"><em>\u201cThe complexity of Anchor\u2019s C2 communication and the payloads that the bot can execute reflect not only a portion of the Trickbot actors\u2019 considerable capabilities but also their ability to constantly innovate, as evidenced by their move to Linux.\u201d<\/em> we read in the report.<\/p>\n\n\n\n<p>Once executed the command, the bot sends the result of the execution to the C2 server.<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/110092\/cyber-crime\/trickbot-linux-variant.html\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"popular-messaging-apps-are-a-security-risk-again-but-this-time-the-problem-is-associated-with-link-previews\"><strong>Popular messaging apps are a security risk\u2026 again. But this time the problem is associated with Link Previews<\/strong><\/h2>\n\n\n<p>Messaging apps cause a bunch of problems &#8211; leak IP addresses, expose links sent via end-to-end encrypted chats, and even unnecessarily download gigabytes of data stealthily in the background. Now it looks like there is a new problem on the list. These apps rely on servers to generate link previews and maybe violating the privacy of their users by sending links shared in a private chat to their servers.<\/p>\n\n\n\n<p>Link previews are a common feature in most messaging apps. Some &#8211; like Signal and Wire &#8211; give users the option to turn on\/off link previews. A few others like Threema, TikTok, and WeChat don&#8217;t generate a link preview at all.<\/p>\n\n\n\n<p>The apps that do generate the previews do so either at the sender&#8217;s end or the recipient&#8217;s end or using an external server that&#8217;s then sent back to both the sender and receiver. Sender-side link previews &#8211; used in Apple iMessage or Facebook&#8217;s WhatsApp &#8211; works by downloading the link, followed by creating the preview image and summary, which is then sent to the recipient as an attachment. When the app on the other end receives the preview, it displays the message without opening the link, thus protecting the user from malicious links.<\/p>\n\n\n\n<p>There is another problem. The messaging app, upon receiving a message with a link, opens the URL automatically to create the preview by disclosing the phone&#8217;s IP address in the request sent to the server. A bad actor is able to gain information about user approximate location without any action taken by the receiver by simply sending a link to a server under their control.<\/p>\n\n\n\n<p>Lastly, does the server used to generate the preview retain a copy, and if so, for how long, and what do they use it for? Many apps impose a 15-50 MB cap when it comes to the files downloaded by their respective servers. Slack caches link previews for around 30 minutes. Facebook Messenger and Instagram, were found to download entire files, even if they ran into gigabytes in size. Do these servers retain a copy? What if there is ever a data breach of these servers?<\/p>\n\n\n\n<p>Now answer this: have you ever shared bills, contracts, or anything that may be confidential this way?<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2020\/10\/mobile-messaging-apps.html\" target=\"_blank\" rel=\"noreferrer noopener\">Source<\/a><\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Massive Nitro data breach impacts Microsoft, Google, Apple, more+ (<a href=\"http:\/\/bleepingcomputer.com\/news\/security\/massive-nitro-data-breach-impacts-microsoft-google-apple-more\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)&nbsp;<br>2. Hacker steals $24 million from cryptocurrency service 'Harvest Finance&#8217; (<a href=\"https:\/\/www.zdnet.com\/article\/hacker-steals-24-million-from-cryptocurrency-service-harvest-finance\/#ftag=RSSbaffb68\" target=\"_blank\" rel=\"noreferrer noopener\">ZDNet<\/a>)<br>3. LinkedIn, Instagram Vulnerable to Preview-Link RCE Security Woes(<a href=\"https:\/\/threatpost.com\/linkedin-instagram-preview-link-rce-security\/160600\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>4. Microsoft shares list of URLs required by Microsoft Defender ATP (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-shares-list-of-urls-required-by-microsoft-defender-atp\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>5. Fragomen law firm data breach exposed Google employee\u2019s data (<a href=\"https:\/\/securityaffairs.co\/wordpress\/110054\/data-breach\/fragomen-data-breach.html\" target=\"_blank\" rel=\"noreferrer noopener\">Security Affairs<\/a>)<br>6. Russian Turla hackers breach European government organization (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russian-turla-hackers-breach-european-government-organization\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>7. Nando\u2019s Hackers Feast on Customer Accounts (<a href=\"https:\/\/threatpost.com\/nandos-hackers-customer-accounts\/160527\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)<br>8. Amazon sacks insiders over data leak, alerts customers (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/amazon-sacks-insiders-over-data-leak-alerts-customers\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<br>9. Containerd Bug Exposes Cloud Account Credentials (<a href=\"https:\/\/threatpost.com\/containerd-bug-cloud-account-credentials\/160546\/\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Post<\/a>)&nbsp;<br>10. Google employees personal info exposed in law firm data breach (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/google-employees-personal-info-exposed-in-law-firm-data-breach\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bleeping Computer<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Google continues to struggle with keeping bad apps off Play marketplace. This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million&#8230; Yes, definitely &#8211; Google is still struggling with its marketplace security.<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-3309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>HiddenAds malware does manage to slip into Google Play... again - Xopero Blog<\/title>\n<meta name=\"description\" content=\"This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HiddenAds malware does manage to slip into Google Play... again - Xopero Blog\" \/>\n<meta property=\"og:description\" content=\"This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-02T07:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T11:24:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"HiddenAds malware does manage to slip into Google Play&#8230; again\",\"datePublished\":\"2020-11-02T07:03:00+00:00\",\"dateModified\":\"2023-08-16T11:24:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/\"},\"wordCount\":1284,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/\",\"name\":\"HiddenAds malware does manage to slip into Google Play... again - Xopero Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2020-11-02T07:03:00+00:00\",\"dateModified\":\"2023-08-16T11:24:40+00:00\",\"description\":\"This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/hiddenads-malware-does-manage-to-slip-into-google-play-again\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HiddenAds malware does manage to slip into Google Play&#8230; again\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HiddenAds malware does manage to slip into Google Play... again - Xopero Blog","description":"This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/","og_locale":"pl_PL","og_type":"article","og_title":"HiddenAds malware does manage to slip into Google Play... again - Xopero Blog","og_description":"This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million...","og_url":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2020-11-02T07:03:00+00:00","article_modified_time":"2023-08-16T11:24:40+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"6 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"HiddenAds malware does manage to slip into Google Play&#8230; again","datePublished":"2020-11-02T07:03:00+00:00","dateModified":"2023-08-16T11:24:40+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/"},"wordCount":1284,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/","url":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/","name":"HiddenAds malware does manage to slip into Google Play... again - Xopero Blog","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2020-11-02T07:03:00+00:00","dateModified":"2023-08-16T11:24:40+00:00","description":"This time researchers have discovered malicious gaming apps packed with a new threat from HiddenAds malware family. Apps were downloaded 8 million...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/hiddenads-malware-does-manage-to-slip-into-google-play-again\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"HiddenAds malware does manage to slip into Google Play&#8230; again"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=3309"}],"version-history":[{"count":5,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3309\/revisions"}],"predecessor-version":[{"id":5041,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/3309\/revisions\/5041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=3309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=3309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=3309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}