Fake Android Flash Player installers hide malware and adware, security researchers say Cybercriminals are trying to capitalize on Adobe’s decision to stop distributing Android Flash Player to new users via Google Play by creating malware and adware apps that masquerade as Flash Player installers.Since Aug. 15, Android users who didn’t already have Flash Player installed on their devices could no longer obtain it from Google Play.This is the result of Adobe’s decision to phase out Android Flash Player in favor of Adobe AIR, a cross-platform runtime environment that enables developers to package native apps for different mobile platforms and devices.“Of course, it’s possible that some Android users have missed that deadline, so they venture on to other parts of the Internet in search of alternative download sites,” Jovi Umawing, a communications and research analyst at GFI Software, said Wednesday in a blog post. This is precisely what cybercriminals are counting on, as GFI’s security researchers have already identified multiple SMS Trojan apps packaged as Flash Player for Android.Most of these apps are distributed from third-party Russian app stores and websites. However, the company’s researchers have also come across an English-language scam that tried to pass an adware app as Android Flash Player. This particular piece of adware creates shortcut files on the home screen that lead to advertisements, displays ads via Android’s notification bar every 15 minutes and sends information about the user’s contacts to advertisers, Umawing said.The rogue adware installer also downloads and installs a modified version of Flash Player from XDA-Developers, a legitimate online community of mobile developers.“While [the modified Flash Player] is not malicious in itself, Adobe does not support it — worse, it could cause some problems to the device,” Umawing said. “With a rooted device, future updates of this hacked app may grant or install new permissions users are not aware of.”Researchers from security vendor Webroot have also noticed the wave of rogue apps masquerading as Android Flash Player that appeared on the Internet after Adobe decided to stop distributing the software through Google Play.The fake Flash Player installers detected by Webroot’s researchers consist of the same type of premium-rate SMS sending Trojan apps and adware that GFI’s researchers observed.For example, one particular app claiming to be Android Flash Player only installs a Flash Player icon that opens a page full of advertisements in the browser when clicked, Webroot security researcher Joe McManus said in a blog post on Thursday. “These types of apps are annoying and really are meant to drive web traffic to sites so the developer can receive pay-per-click revenue, and in this case they deceive the customer into thinking they’re getting a known productive app,” McManus said.Users who missed Adobe’s deadline and still want to install Android Flash Player don’t need to go looking for it on third-party app stores and other websites that they don’t trust.The latest version of the software is still available in Adobe’s official Flash Player archive and can be downloaded from there. However, users who install it this way will not automatically receive future updates for critical bugs that Adobe will release via Google Play to existing users. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe