Online Threat Alerts (OTA) - Alerting you to scams and frauds.
Virus - Malware - Spyware
Security researchers from Check Point have discovered 210 infected Android apps packed with adware that could compromise your Android device. Check Point found malicious code called "Simbad" in 210 Android apps in the Google Play store that had been downloaded nearly 150 million times. The "SimBad" code is part of the new adware campaign and is hidden inside a software development kit (SDK) on these apps. Adware is a form of malware that installs itself on your device without you knowing and then displays ads.
Check Point's researchers said: "The infected apps are able to display background ads, open the browser to any page and download more malicious apps from either the Google Play store or a remote server." The new browser page can lead to phishing websites with pages that look real but are designed to trick people into revealing their login credentials. There is also code on the SDK that allowed the malicious app to delete its own icon, making it harder for victims to delete.
Check Point notified Google, and Google said the apps have been removed from the Play store. But, although Google has removed the apps, they are still installed on millions of Android devices. Therefore, if you have any of the infected apps listed below on your Android device, please remove or uninstall them.
3
How do we remove hidden SDK and further malware?
Uninstalling the app is enough. The SDK is used by the programmers to infect the apps. They use the SDK to inject the adware in the apps and rebuild the apps and put them in the app store for Android users to download.
I had downloaded volume booster from the play store several months back. The ones on the list do they have the types (names) of them?