By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
PratapDarpanPratapDarpanPratapDarpan
  • Top News
  • India
  • Buisness
    • Market Insight
  • Entertainment
    • CELEBRITY TRENDS
  • World News
  • LifeStyle
  • Sports
  • Gujarat
  • Tech hub
  • E-paper
Reading: 331 removes dangerous apps from Google Play Store, all were part of vapor operations
Share
Notification Show More
Font ResizerAa
Font ResizerAa
PratapDarpanPratapDarpan
  • Top News
  • India
  • Buisness
  • Entertainment
  • World News
  • LifeStyle
  • Sports
  • Gujarat
  • Tech hub
  • E-paper
Search
  • Top News
  • India
  • Buisness
    • Market Insight
  • Entertainment
    • CELEBRITY TRENDS
  • World News
  • LifeStyle
  • Sports
  • Gujarat
  • Tech hub
  • E-paper
Have an existing account? Sign In
Follow US
  • Contact Us
  • About Us
  • About Us
  • Privacy Policy
  • Privacy Policy
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
PratapDarpan > Blog > Tech Hub > 331 removes dangerous apps from Google Play Store, all were part of vapor operations
Tech Hub

331 removes dangerous apps from Google Play Store, all were part of vapor operations

PratapDarpan
Last updated: 21 March 2025 14:11
PratapDarpan
3 months ago
Share
331 removes dangerous apps from Google Play Store, all were part of vapor operations
SHARE

Contents
331 removes dangerous apps from Google Play Store, all were part of vapor operationsThere were some malicious apps that were presented as a real app on the Play Store and Google has removed 331 of them. Apps were stealing details from Android phone users.What is a vapor operation?How the attack was detectedHow to be safe

331 removes dangerous apps from Google Play Store, all were part of vapor operations

There were some malicious apps that were presented as a real app on the Play Store and Google has removed 331 of them. Apps were stealing details from Android phone users.

Listen to the story

Advertisement
331 removes dangerous apps from Google Play Store, all were part of vapor operations

Security researchers, a company Bitdefinder, who specializes in cyber security, has demolished large -scale advertising fraud and phishing expeditions on Google Play Store, including 331 malicious apps. Dubbed vapor operation, this fraud campaign managed to bypass security facilities in Android 13 and collectively download more than 60 million downloads. The campaign was first discovered by the IAS Threat Lab in early 2024, which initially linked 180 apps with operation.

Advertisement

According to the researchers, malicious apps manifests as harmless devices, but secretly bomb users with infiltration advertisements, theft credibility, and even cut card details. In a statement by Bleepingcomputer, Google confirmed that “all identified apps of this report have been removed from Google Play.” However, Bitdefnder noted in his report that 15 apps were still available until the research was completed.

What is a vapor operation?

The vapor campaign run by cyber criminals is active from the beginning of 2024. It initially began as an advertising fraud scheme. The IAS Threat Lab originally stated that the campaign consisted of 180 apps that generated 200 million fraudulant advertising requests daily. These apps were designed to dry the budget of advertisers through fake click.

In its latest report, Bitdefnder noted that in malicious operation, there are now 331 apps in categories such as health trackers, QR scanners, note taking equipment and battery optimizer.

Advertisement

Some of these cheated apps include:

Aquatracker, clicksave downloader, and scan haw, with each 1 million downloads.

Translator and Beatwatch, which have 100,000 and 500,000 downloads.

Allegedly, these apps were uploaded to Google Play between October 2024 and March 2025, mainly users in Brazil, America, Mexico, Turkey and South Korea.

How the attack was detected

While malware attacks are reported from time to time, the vapor operation was particularly related as it managed to avoid Google’s safety measures for Android.

According to the report, the apps bypassed the Android Security Check by acting as an advertisement app at the time of submission. The malicious code was later distributed through the update from the command-end-control (C2) server.

After their installation, apps disable their launcher activities in Androidmanifest.xml file, removed their icon from the home screen – a strategy restricted in Android 13 and subsequent versions. Some changed their names in device settings to imitate reliable apps such as Google Voice.

Once the apps controlled the system, they misused Android’s contact material provider system to launch without user interactions, bypassing Android 13 restrictions.

Apps then issued full-screen advertisements, kidnaping devices through a virtual secondary screen, disabled back buttons and hide from the “recent task” menu. Some apps also increased for fishing, displaying fake login pages for Facebook, YouTube and payment portal. This is a problem that users in India have often faced, especially users who are not very technical intelligent.

Advertisement

While many app advertisements focused on fraud, others targeted the sensitive information of the victims. Many affected users reported to be trapped in the ends of advertisements that would not close or advertise advertisements to explain the fishing pages. In one case, the apps falsely claimed that the equipment to pressurize users in downloading additional malware was “infected”.

How to be safe

Although Google has removed most of these malware-infected apps, it is still important to take safety precautions while downloading the apps from the Play Store and when browsing the Internet. Here are some things:

Avoid unnecessary apps: Always download the app from famous developers and check the permissions asked by the app.

Check installed apps: Compare your app drawer with Settings> Apps>> Watch all apps to spot Hidden Malware.

Use safety equipment: Enable security equipment such as Google Play Protect, which examines your apps and equipment for harmful behavior. It also runs a security check on the apps from Google Play Store before downloading.

Update regularly: Ensure that your Android OS and apps are updated to patches weaknesses.

You Might Also Like

Telegram adds option for users to report content on the app, two weeks after CEO Pavel Durov’s arrest
Nothing The phone 3A, 3A Pro launch was confirmed: India Price, Design, Glasses and everything else expected
OnePlus Nord CE4 Lite hands-on review
Google Pixel 9 Pro Fold shows Samsung is losing the race to foldable development
Blackview BL9000 Pro with FLIR Camera Hands-on Review
TAGGED:appsdangerousGoogleoperationspartPlayremovesstorevapor
Share This Article
Facebook Email Print
Previous Article Jennifer Garner is ‘arriving’ for Jennifer Lopez despite divorce with rumors; Source Jennifer Garner is ‘arriving’ for Jennifer Lopez despite divorce with rumors; Source
Next Article Akshay Kumar indicated about Kesari Chapter 2 in the 6th anniversary post of the film Akshay Kumar indicated about Kesari Chapter 2 in the 6th anniversary post of the film
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

about us

We influence 20 million users and is the number one business and technology news network on the planet.

Find Us on Socials

© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

Zero spam, Unsubscribe at any time.
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?

Not a member? Sign Up