Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Hundreds of Malware-Laden Apps Downloaded 42 Million Times From Google
News

Hundreds of Malware-Laden Apps Downloaded 42 Million Times From Google

Team-CWDBy Team-CWDNovember 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security researchers observed a 67% increase in malware targeting Android devices over the past year, with hundreds of malicious apps making their way onto the official Google Play store.

Zscaler revealed the findings in its ThreatLabz 2025 Mobile, IoT, and OT Threat Report, which is compiled from analysis of over 20 million mobile requests sent from devices between June 2024 and May 2025.

It claimed that, during the period, 239 malware-laden apps bypassed Google’s filters to end up on the Play store, where they were downloaded 42 million times.

Among the most common were productivity and workflow apps published under the “Tools” category. Zscaler warned that threat actors successfully exploited users’ trust in functionality-driven applications and desire to download such software to help with remote working.

Read more on mobile threats: 82% of Phishing Sites Now Target Mobile Devices

The manufacturing and energy sectors were most frequently targeted by threat actors during the period, with the latter recording a 387% annual increase in mobile attacks. India (26%), the US (15%) and Canada (14%) accounted for the majority of malicious mobile traffic, with threat volumes surging 38% year on year (YoY) in India.

Mirai Dominates IoT Threats

When it came to IoT threats, 40% of blocked requests were linked to the Mirai family, with a further 35% attributed to the Gafgyt malware variant.

Manufacturing and transportation were once again the most frequently targeted verticals, each accounting for around a fifth of all observed IoT malware attacks. This marks a shift from 2024, when manufacturing represented 36% of total incidents, followed by transportation at 14%.

The US stood out as the number one target for IoT threat activity, accounting for over half (54%) of all attacks. It was followed by Hong Kong (15%), Germany (6%), India (5%) and China (4%).

“Attackers are pivoting to areas with maximum impact. We’re seeing a YoY rise of 67% in malware targeting mobile devices and 387% in IoT/OT attacks on energy sectors often hosting critical infrastructure, which is a massive swing,” said Deepen Desai, EVP and chief security officer at Zscaler.

“A Zero Trust everywhere approach, combined with AI-powered threat detection, is imperative to reducing the attack surface, limiting lateral movement, and providing organizations the defense they need against ever-evolving attacks.”

Image credit: Poetra.RH / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleResearchers Expose GhostCall and GhostHire: BlueNoroff’s New Malware Chains
Next Article New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human
Team-CWD
  • Website

Related Posts

News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How the always-on generation can level up their cybersecurity game

September 11, 2025

What is it, and how do I get it off my device?

September 11, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.