More malware targeting Google Android devices but pretending to be legit apps managed to sneak into Google Market over the long holiday weekend, and Google did take steps to yank them, according to a mobile security firm. More malware targeting Google Android devices but pretending to be legit apps managed to sneak into Google Market over the long holiday weekend, and Google did take steps to yank them, according to a mobile security firm.Approximately 25 apps were pulled from Google Market by Google, according to Lookout Mobile Security, which has taken to calling this round of Google apps malware “Droid Dream Light.” The firm said about 30,000 to 120,000 users appear to have been infected by them prior to the discovery they were malicious apps. The list of infected applications includes those by the names “Magic Photo Studio,” “Mango Studio,” “E.T. Tean,” and “BeeGoo.” According to Lookout, the malicious components of the Droid Dream Light apps are not dependent on manual launch of the installed application to trigger its behavior.ANALYSIS: Google Android’s infected apps spotlight mobile dangerThe Dream Droid Light episode related to the Android Market comes after the so-called “DroidDream” attack of early March where more than 50 malicious apps were discovered on Google Market, prompting a sense of heightened concern among Google Android users and the security community, with Google vowing to try to prevent this from occurring in the future. Read more about wide area network in Network World’s Wide Area Network section. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe