Google claims that it prevented 1.2 million bad applications from reaching Google Play in 2021, but cybercriminals are still finding ways to deliver malware through the official Android app store.
According to data shared by Google on Wednesday, its automated systems helped block 1.2 million “policy violating apps” from being published on Google Play, thus preventing billions of “harmful installations.”
In addition, the internet giant blocked 190,000 accounts belonging to bad developers, and it closed half a million developer accounts that were abandoned or inactive.
The company said it has also taken various other steps to improve Android security and privacy, including by providing new compliance tools for developers, improving the safety of SDKs, limiting access to sensitive APIs and data, and new malware detection capabilities for Pixel phones.
But despite these improvements, malware and scam apps continue making their way to Google Play, and some of them are installed by hundreds of thousands and even millions of users.
Recent examples of Android malware that was delivered through Google Play include the Xenomorph banking trojan, the Dark Herring scareware, the SharkBot banking trojan, the Joker fleeceware (subscribes users to premium services), and the Facestealer information stealer.
Cybersecurity firm Dr Web reported recently that it had seen “many threats on Google Play” at the beginning of the year, including apps that lured victims to phishing sites and ones that subscribed users to paid services.
Google also informed users this week that they will start seeing a new Data Safety section in Google Play. In this section, application developers are required — until July 20 — to provide information on whether they are collecting data and sharing it with third parties, and the security practices of their app. The Data Safety section was first announced in May 2021.
Related: Google Details New Privacy and Security Policies for Android Apps
Related: 44 Vulnerabilities Patched in Android With April 2022 Security Updates

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
Latest News
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill
- Musk, Scientists Call for Halt to AI Race Sparked by ChatGPT
- Malware Hunters Spot Supply Chain Attack Hitting 3CX Desktop App
