• Latest
  • Trending
  • All
  • News
Android Minecraft Clone Games Infected with HiddenAds Adware, Attracting 35M Downloads

Android Minecraft Clone Games Infected with HiddenAds Adware, Attracting 35M Downloads

August 19, 2023
Preparing for Quantum-Powered Attacks: A Guide for Businesses

Preparing for Quantum-Powered Attacks: A Guide for Businesses

October 2, 2023
The Impending Threat of 'Steal Now, Crack Later' Quantum Computing

The Impending Threat of ‘Steal Now, Crack Later’ Quantum Computing

September 25, 2023
The Dominance of Email as the Primary Attack Vector

The Dominance of Email as the Primary Attack Vector

September 18, 2023
Devastating Ransomware Attack Paralyzes Danish Cloud Provider

Devastating Ransomware Attack Paralyzes Danish Cloud Provider

September 11, 2023
The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

The Future Landscape of Ransomware Business Models: Examining Realistic Scenarios and Emerging Threats

September 4, 2023
Understanding the GoAnywhere Data Breach and its Implications

Understanding the GoAnywhere Data Breach and its Implications

August 24, 2023
Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

Safeguarding Your Identity: A Comprehensive Guide to Detecting Identity Theft

August 23, 2023
Identity Theft: Steps to Take in Case of a Breach

Identity Theft: Steps to Take in Case of a Breach

August 22, 2023
Enhancing Organizational Security Posture through Encryption: Key Tips

Enhancing Organizational Security Posture through Encryption: Key Tips

August 22, 2023

Understanding the Potential Threat of ‘Steal Now, Crack Later’ Attacks in Quantum Computing

August 21, 2023
Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

Business Email Compromise Attack: A Costly Threat That Surpasses Ransomware Losses

August 21, 2023
The Challenges of Patching Vulnerabilities and the Importance of Prioritization

The Challenges of Patching Vulnerabilities and the Importance of Prioritization

August 20, 2023
  • About
  • Advertise
  • Privacy & Policy
  • Contact
2 °c
Boydton
4 ° Mon
7 ° Tue
7 ° Wed
16 ° Thu
21 ° Fri
15 ° Sat
REPORT NEW Vulnerability
Monday, October 2, 2023
No Result
View All Result
  • Login
  • Register
Innocent Michael
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
Innocent Michael
No Result
View All Result
Home Adware

Android Minecraft Clone Games Infected with HiddenAds Adware, Attracting 35M Downloads

Cyber Intelligence by Cyber Intelligence
1 month ago
in Adware
245 8
A A
0
Android Minecraft Clone Games Infected with HiddenAds Adware, Attracting 35M Downloads
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

A group of 38 Minecraft-like games available on Google Play have been found to contain the Android adware ‘HiddenAds,’ which discreetly loads ads in the background to generate revenue for its operators.

Minecraft, a popular sandbox game with a monthly active player base of 140 million, has inspired various game publishers to create similar games.

Related articles

Android Malware Apps with 2 Million Installs Detected on Google Play Store

Android Malware Apps with 2 Million Installs Detected on Google Play Store

1 month ago
1.4k
The Fireball Malware Threat: The Introduction

The Fireball Malware Threat: The Introduction

7 months ago
1.4k

These adware-infected Minecraft clones were downloaded by approximately 35 million Android users worldwide, primarily from the United States, Canada, South Korea, and Brazil. Users were unaware of the malicious adware activity occurring in the background, as the games appeared to function as promised. Any signs of overheating, increased network data, or battery consumption caused by excessive ad loading may have been attributed to the game itself.

The adware set was discovered by McAfee’s Mobile Research Team, a member of the App Defense Alliance formed to protect Google Play from all types of threats.

Upon reporting, all the apps were promptly removed from the store. The most popular apps from this malicious set, which have now been removed, included:

  1. Block Box Master Diamond – 10 million downloads
  2. Craft Sword Mini Fun – 5 million downloads
  3. Block Box Skyland Sword – 5 million downloads
  4. Craft Monster Crazy Sword – 5 million downloads
  5. Block Pro Forrest Diamond – 1 million downloads
  6. Block Game Skyland Forrest – 1 million downloads
  7. Block Rainbow Sword Dragon – 1 million downloads
  8. Craft Rainbow Mini Builder – 1 million downloads
  9. Block Forrest Tree Crazy – 1 million downloads

The advertisements are loaded silently in the background once the user launches the game, without any visible display on the game screen.

Network traffic analysis has revealed questionable packets exchanged by ad libraries associated with Google, AppLovin, Unity, Supersonic, and others. McAfee’s report indicates that several of the apps exhibit similar network structures, using “3.txt” as the path in the form of “https://(random).netlify.app/3.txt,” although the domains differ for each app. This suggests a possible connection between the games and potentially indicates a shared authorship. However, McAfee does not explicitly confirm any definitive links.

While adware apps may not pose significant risks to users, they can hamper device performance, raise privacy concerns, and potentially create security vulnerabilities that may expose users to more severe infections. Android users are advised to review McAfee’s report for a comprehensive list of affected apps and manually remove them if they have not already been eradicated.

Share196Tweet123
Cyber Intelligence

Cyber Intelligence

Subscribe
Connect with
Login
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
Notify of
guest
I allow to create an account
When you login first time using a Social Login button, we collect your account public profile information shared by Social Login provider, based on your privacy settings. We also get your email address to automatically create an account for you in our website. Once your account is created, you'll be logged-in to this account.
DisagreeAgree
guest
0 Comments
Inline Feedbacks
View all comments
Innocent Michael

Copyright © 2023 Inncent Michael.

Navigate Site

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Follow Us

No Result
View All Result
  • Home
  • Solutions
  • Our Lab
    • Threat Scanner
    • Virus
    • Malware
    • Spyware
  • News
  • Products
    • Domains – Search, Register & Transfer
      • Overview
      • Register Domain
      • Transfer domain
      • Domain Renewal
      • My Domains
    • AntiVirus Protection Plan
    • Website Design Assist
    • Professional Streaming Studio
    • Legal Office Management Tool
    • Auto Attendant – Virtual Business Phone Numbers & Phone System
  • Businesses
  • Information
  • Company
  • Legal
  • Login
  • Sign Up
REPORT NEW Vulnerability

Welcome Back!

Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
OR

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply