Recently, cybersecurity experts at Malwarebytes Labs uncovered a set of malicious apps on Google's Play Store.

According to experts, four malicious apps have been detected on the Play Store, concealing a trojan capable of distributing ads and redirecting users to fraudulent websites.
In contrast to many previous adware, this trojan employs an entirely new attack method. Experts reveal that the trojan remains inactive for 72 hours after the user installs the app to avoid attracting the victim's attention.
'Delaying the attack behavior is a tactic employed by hackers to avoid detection. After the initial period, these malicious apps will automatically open fraudulent websites in the Chrome browser. Some fraudulent websites are designed to earn money through each ad click, while others hide more significant dangers' - emphasized by Malwarebytes Labs experts.
The malicious code not only consumes users' mobile data when opening ad-filled websites but also has a significant impact on the phone's battery life as this code operates silently for extended periods.
The list of 4 apps containing malicious code, as discovered by security experts at Malwarebytes Labs, includes:
- Bluetooth Auto Connect (approximately 1,000,000 downloads)
- Bluetooth App Sender (approximately 50,000 downloads)
- Driver: Bluetooth, Wi-Fi, USB (approximately 10,000 downloads)
- Mobile Transfer: Smart Switch (approximately 1,000 downloads)
If any of these apps are mistakenly installed, users should promptly remove them from their phones.
