Skip to content
logo The magazine for digital lifestyle and entertainment
More Than 300 Apps Affected

Contaminated by Viruses! You Should Delete These Apps Immediately

The Vapor malware not only displays fraudulent advertising, but can also steal login and credit card data
The Vapor malware not only displays fraudulent advertising, but can also steal login and credit card data Photo: Getty Images/Westend61

March 22, 2025, 9:06 am | Read time: 3 minutes

Security researchers have uncovered a large-scale malware campaign with more than 300 infected Android apps. Affected users must take action to remove the malware from their smartphones.

Share article

In total, the apps have been installed more than 56 million times. They pretend to be helpful utilities but activate their adware function once launched. In some cases, they even lead unsuspecting users to fake websites in order to obtain login details or credit card information.

Large-Scale Malware Campaign “Vapor”

The threat detection laboratory of the advertising researcher IAS has published a detailed report on the potential dangers of Vapor malware. IAS was initially able to identify 180 malicious apps in the malware campaign, which has been running since the beginning of 2024. These generated 200 million fraudulent advertising requests every day:

“When the app is fully set up, it immediately attempts to overwhelm the user with full-screen interstitial ads that hijack the device’s screen and render the user’s device largely inoperable.”

IAS: Vapor Threat Report

A later report from Bitdefender corrected the number of affected apps to 331, with most infections in Brazil, the US, Mexico, Turkey, and South Korea.

More on the topic

Phishing Attacks with Fake Websites

The Vapor malware campaign uses deceptively real service apps such as health trackers, diaries, and QR scanners. The apps gain the trust of users before they subsequently activate their malicious functions. Some of the apps also open fake login screens for Facebook and YouTube. This allows them to steal access data or trick users into entering their credit card details.

The attackers distributed their apps across several developer accounts to make detection more difficult and minimize the damage in the event of removal by Google. Five of the identified apps have more than one million downloads each, according to Bleeping Computer.

  • AquaTracker — 1 million downloads
  • ClickSave Downloader — 1 million downloads
  • Scan Hawk — 1 million downloads
  • Water Time Tracker — 1 million downloads
  • Be More — 1 million downloads
  • BeatWatch — 500,000 downloads
  • TranslateScan — 100,000 downloads
  • Handset Locator — 50,000 downloads.

The complete list of installation packages can be found in a freely accessible Excel document and on the developer platform Github with the package names or the corresponding websites. If any of these apps are still on your smartphone, TECHBOOK recommends that you uninstall them immediately.

Most of these apps appeared in the Google Play Store between October 2024 and March 2025. Although Google has since removed these malicious apps from the Play Store, security experts warn that similar threats could reappear. The attackers are able to bypass Google’s security checks. Users should, therefore, be careful when installing apps from unknown developers. We also recommend regularly checking the permissions to ensure that the apps do not gain unauthorized access to sensitive data.

This article is a machine translation of the original German version of TECHBOOK and has been reviewed for accuracy and quality by a native speaker. For feedback, please contact us at info@techbook.de.

Topics Android News Play Store Security
Your data privacy when using the share function
To share this article or other content via social networks, we need your consent for this .
You have successfully withdrawn your consent to the processing of personal data through tracking and advertising when using this website. You can now consent to data processing again or object to legitimate interests.