Android apps infected with umm… *Windows* malware

145 Android apps yanked from official Google Play store.

Android apps infected with umm... *Windows* malware

Security researchers at Palo Alto Networks recently discovered 145 apps in the official Google Play Android store that were “infected by malicious Microsoft Windows executable files.”

Yes, you read that correctly. Android apps carrying malicious Windows executables.

The malicious code can’t infect your Android device, of course, as the malware needs to run on a Windows system… not an Android one.

Sign up to our free newsletter.
Security news, advice, and tips.

But it’s still a concern. Why? Because, as the security researchers explain in a blog post, it suggests that software developer ‘odieapps’ is not creating their apps in secure environment:

Notably, the infected APK files do not pose any threat to Android devices, as these embedded Windows executable binaries can only run on Windows systems: they are inert and ineffective on the Android platform. The fact that these APK files are infected indicates that the developers are creating the software on compromised Windows systems that are infected with malware. This type of infection is a threat to the software supply chain, as compromising software developers has proven to be an effective tactic for wide scale attacks. Examples include, KeRanger, XcodeGhost, and NotPetya.

The researchers report that many of the malware-carrying apps have gone unnoticed in the Google Play store for over half a year, and some have been downloaded over a thousand times and received four-star ratings.

Infected apps include “Learn to Draw Clothing”, “Hair Paint Color”, “Men’s Design Ideas”, “Modification Trail” (for fans of trail biking), and “Gymnastics Training Tutorial”.

Gym training app

So, what would happen if the malicious code in these Android apps *did* end up running on a Windows computer? The malware would attempt to capture your keypresses, stealing passwords, credit card details, and any other sensitive information you might type.

Palo Alto’s researchers informed Google’s security team of the problem, and the offending apps have been chucked out of the Google Play store.

But one wonders how many other Android apps are unknowingly being piggybacked by Windows malware. And, of course, how many software developers are building their programs in insecure environments.

Found this article interesting? Follow Graham Cluley on Twitter, Mastodon, or Threads to read more of the exclusive content we post.


Graham Cluley is a veteran of the cybersecurity industry, having worked for a number of security companies since the early 1990s when he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows. Now an independent analyst, he regularly makes media appearances and is an international public speaker on the topic of cybersecurity, hackers, and online privacy. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

2 comments on “Android apps infected with umm… *Windows* malware”

  1. Patrick Snell

    Is there a list of the 145 apps so we can get them off our phones?

    1. Gary Taylor · in reply to Patrick Snell

      Hi I found some by using the link in the piece click on "explain in a blog post". Or this is the address it opens:- https://researchcenter.paloaltonetworks.com/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.