• Home
  • News
  • Coins2Day 500
  • Tech
  • Finance
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechGoogle

How to spot fake apps on the Google Play store

By
Daniel Roberts
Daniel Roberts
Down Arrow Button Icon
By
Daniel Roberts
Daniel Roberts
Down Arrow Button Icon
July 8, 2015, 2:00 PM ET
Google To Sell Nexus 7 In Japan As Tablet Computer Demand Surges
Google Inc.'s Japanese website is displayed on the company's Nexus 7 tablet computer at a news conference in Tokyo, Japan, on Tuesday, Sept. 25, 2012. Google said it will sell its Nexus 7 handheld computers in Japan, where annual shipments of tablet devices may triple to 11 million units in five years. Photographer: Tomohiro Ohsumi/Bloomberg via Getty ImagesPhotograph by Tomohiro Ohsumi — Bloomberg via Getty Images

Android’s open-source accessibility is one of its appeals to developers—but it also appeals to attackers. This week, BBC reports, Google (GOOG) had to pull a malicious Android app from its Google Play store.

The malicious software was disguised as BatteryBot Pro, a real app for tracking the power usage of your phone. The fake version of the app was reportedly able to send text messages on the user’s behalf and also blocked users from deleting it from their phones.

The internet security company Zscaler wrote about the app spoofing on its official blog, noting that the practice of “embedding malicious modules into” an existing app is common on the Android operating system—more common than the other method of malware development, which is to create a malicious app from scratch.

Google promptly yanked the bad apple app from its store once it became aware of the problem.

One helpful way to spot malicious app right away? Pay attention to the permissions it requires, which it lists in its app description before you download. As Zscaler wrote, “The legit BatteryBotPro app demanded for minimal permissions,” while, in contrast, “Upon installation of the malicious app, it demanded administrative access, which clearly portrays the motive of malware developer to obtain full control access of the victim’s device.”

About the Author
By Daniel Roberts
See full bioRight Arrow Button Icon
Rankings
  • 100 Best Companies
  • Coins2Day 500
  • Global 500
  • Coins2Day 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Leadership
  • Success
  • Tech
  • Asia
  • Europe
  • Environment
  • Coins2Day Crypto
  • Health
  • Retail
  • Lifestyle
  • Politics
  • Newsletters
  • Magazine
  • Features
  • Commentary
  • Mpw
  • CEO Initiative
  • Conferences
  • Personal Finance
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Coins2Day Brand Studio
  • Coins2Day Analytics
  • Coins2Day Conferences
  • Business Development
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Coins2Day
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map

© 2025 Coins2Day Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Coins2Day Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.