Android apps infected with umm… *Windows* malware

145 Android apps yanked from official Google Play store.

Android apps infected with umm... *Windows* malware

Security researchers at Palo Alto Networks recently discovered 145 apps in the official Google Play Android store that were “infected by malicious Microsoft Windows executable files.”

Yes, you read that correctly. Android apps carrying malicious Windows executables.

The malicious code can’t infect your Android device, of course, as the malware needs to run on a Windows system… not an Android one.

Sign up to our free newsletter.
Security news, advice, and tips.

But it’s still a concern. Why? Because, as the security researchers explain in a blog post, it suggests that software developer ‘odieapps’ is not creating their apps in secure environment:

Notably, the infected APK files do not pose any threat to Android devices, as these embedded Windows executable binaries can only run on Windows systems: they are inert and ineffective on the Android platform. The fact that these APK files are infected indicates that the developers are creating the software on compromised Windows systems that are infected with malware. This type of infection is a threat to the software supply chain, as compromising software developers has proven to be an effective tactic for wide scale attacks. Examples include, KeRanger, XcodeGhost, and NotPetya.

The researchers report that many of the malware-carrying apps have gone unnoticed in the Google Play store for over half a year, and some have been downloaded over a thousand times and received four-star ratings.

Infected apps include “Learn to Draw Clothing”, “Hair Paint Color”, “Men’s Design Ideas”, “Modification Trail” (for fans of trail biking), and “Gymnastics Training Tutorial”.

Gym training app

So, what would happen if the malicious code in these Android apps *did* end up running on a Windows computer? The malware would attempt to capture your keypresses, stealing passwords, credit card details, and any other sensitive information you might type.

Palo Alto’s researchers informed Google’s security team of the problem, and the offending apps have been chucked out of the Google Play store.

But one wonders how many other Android apps are unknowingly being piggybacked by Windows malware. And, of course, how many software developers are building their programs in insecure environments.


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "The AI Fix" and "Smashing Security" podcasts. Follow him on Bluesky and Mastodon, or drop him an email.

2 comments on “Android apps infected with umm… *Windows* malware”

  1. Patrick Snell

    Is there a list of the 145 apps so we can get them off our phones?

    1. Gary Taylor · in reply to Patrick Snell

      Hi I found some by using the link in the piece click on "explain in a blog post". Or this is the address it opens:- https://researchcenter.paloaltonetworks.com/2018/07/unit42-hidden-devil-development-life-cycle-google-play-apps-infected-windows-executable-files/

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.