Two million Android devices 'hit by Google Play malware'
Researchers discover close to 45 apps laden with botnet malware

A new strain of malware hidden inside apps on the Google Play store has infected close to two million Android devices over the past year, according to security experts monitoring the spread.
The recently discovered malware, known as 'FalseGuide', has been found lurking in more than 45 Google Play store apps that provide guides and walkthroughs for mobile games.
At first it was believed the some apps may have been operating since February 2017, however further investigations revealed an app was uploaded to the store as early as November 2016.
Close to two million devices are thought to have been infected since that time, with some apps reaching 50,000 installs each, according to security researchers at Check Point, who first discovered the strain.
The firm initially alerted Google to the infected apps in March, which acted to remove them from the store. However since then new apps laden with malware have been added which required further action from Google, Check Point said.
Once installed, the FalseGuide malware is able to hijack a device and add it to a larger botnet. The bots are then used for a number of purposes depending on their computing capabilities. These can include displaying illegitimate pop-up ads that contain malicious code, conducting DDoS attacks against other targets, and even compromising private networks, according to researchers.
Hackers under the names of fake developers Sergei Vernik and Nikolai Zalupkin uploaded the apps over the course of six months, suggesting Russian connections - although the researchers point out that to Russian speakers, the latter name is clearly made up.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Check Point said that the app stands out from other downloads, as it requires the user to grant admin privileges during installation. Once granted, it uses these permissions to avoid detection by the user, and register to a cloud-based messaging topic to receive and download additional infected modules.
Game guides in particular are juicy targets for hackers, given the significant number of users they can reach and the ease with which they can be developed.
These will by no means be the only target however, and Check Point warned that it is important for users to be diligent when downloading apps to their devices, even when taken from official stores, saying: "Users shouldn't rely on the app stores for their protection, and implement additional security measures on their mobile device, just as they use similar solutions on their PCs."
IT Pro has approached Google for comment.
Dale Walker is a contributor specializing in cybersecurity, data protection, and IT regulations. He was the former managing editor at ITPro, as well as its sibling sites CloudPro and ChannelPro. He spent a number of years reporting for ITPro from numerous domestic and international events, including IBM, Red Hat, Google, and has been a regular reporter for Microsoft's various yearly showcases, including Ignite.
-
Cleo attack victim list grows as Hertz confirms customer data stolen
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
Lateral moves in tech: Why leaders should support employee mobility
In-depth Encouraging staff to switch roles can have long-term benefits for skills in the tech sector
By Keri Allan
-
UK crime fighters wrangle “several thousand” potential cyber criminals in DDoS-for-hire honeypot
News The sting follows a recent crackdown on DDoS-for-hire services globally
By Ross Kelly
-
US begins seizure of 48 DDoS-for-hire services following global investigation
News Six people have been arrested who allegedly oversaw computer attacks launched using booters
By Zach Marzouk
-
Will triple extortion ransomware truly take off?
In-depth Operators are now launching attacks with three extortion layers, but there are limitations to this model
By Connor Jones
-
GoDaddy web hosting review
Reviews GoDaddy web hosting is backed by competitive prices and a beginner-friendly dashboard, and while popular, beware of hidden prices
By Daniel Blechynden
-
Japan investigates potential Russian Killnet cyber attacks
News The hacker group has said it’s revolting against the country’s militarism and that it’s “kicking the samurai”
By Zach Marzouk
-
LockBit hacking group to be 'more aggressive' after falling victim to large-scale DDoS attack
News The ransomware group is currently embroiled in a battle after it leaked data belonging to cyber security company Entrust
By Connor Jones
-
Record for the largest ever HTTPS DDoS attack smashed once again
News The DDoS attack lasted 69 minutes and surpassed the previous record of 26 million RPS
By Praharsha Anand
-
Cloudflare unveils new One Partner Program with zero trust at its core
News Cloudflare CEO Matthew Prince says the initiative aims to take the complexity out of zero trust architecture
By Daniel Todd