To prevent apps from downloading executable codes (such as dex, JAR or.so file) from external sources to the official Android app store. If not, the best practices in Google play will guarantee that applications not only be modified or replaced, but also updated in any way other than those provided by Google Play. Googles team explained that apps which do this violate the Google Play Store policy on deceptive behaviour and are subject to some criminal offenses. Google says every app and any patches submitted have rigorous PHA (Potentially Harmful App) screening, but some of these controls are bypassed with the DCL. People who use this technique generally are targeted at user credentials, data and finances. It occurs when a developer publishes an initial version of a developer’s app accessed via the Google Play Store that appears legit and passes our checks, but later receives a link that changes the code on the end users’ device that allows malicious activity. The company says that a malicious activity is called versioning. It is done by updating existing installed applications, or by loading malware from a server, controlled by the attacker (dynamic code loading, DCL), which practically transforms the application into a backdoor. Versioning isn’t a new method, but it’s difficult to detect. The Google security team explained a tactic called versioning, known as ‘the Android criminal’ often uses to infect Android devices with malware after their apps go through Google Play Store review and security control.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |