{"id":36993,"date":"2020-09-02T14:51:16","date_gmt":"2020-09-02T14:51:16","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31537\/Six-More-Apps-Containing-Joker-Malware-Removed-From-The-Google-Play-Store.html"},"modified":"2020-09-02T14:51:16","modified_gmt":"2020-09-02T14:51:16","slug":"six-more-apps-containing-joker-malware-removed-from-the-google-play-store","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/","title":{"rendered":"Six More Apps Containing Joker Malware Removed From The Google Play Store"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2017\/11\/06\/88414444-5cfa-4b65-91e2-c0a98e9cc22d\/thumbnail\/770x578\/07aed26259a9fc83f50682d97812c34e\/istock-614979272.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Cybersecurity researchers have unmasked six applications on the Google Play store with a combined total of over 200,000 downloads in yet another example of the highly persistent malware that has been plaguing Android users for the past three years. <\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/google-details-its-fight-against-the-bread-joker-malware-operation\/\">Joker malware<\/a>&nbsp;pretends to be a legitimate app in the Play Store but after installation conducts billing fraud by either sending SMS messages to a premium rate number or using the victim&#8217;s account to repeatedly make purchases using WAP billing, which also lines the pockets of Joker&#8217;s operators. <\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">More on privacy<\/span> <\/h3>\n<\/p><\/div>\n<p>The activity occurs behind the scenes and without any input required from the user, meaning they often won&#8217;t find out that they&#8217;ve been scammed until they receive a phone bill full of additional charges. <\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><strong>Cybersecurity: Let&#8217;s get tactical<\/strong><\/strong><\/a><strong><strong>&nbsp;(ZDNet\/TechRepublic special feature) |&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/cybersecurity-let-s-get-tactical-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong><strong>Download the free PDF version<\/strong><\/strong><\/a><strong><strong>&nbsp;(TechRepublic)<\/strong><\/strong> <\/p>\n<p>Google has removed over 1,700 apps containing <a href=\"https:\/\/www.zdnet.com\/article\/malicious-android-apps-containing-joker-malware-reach-half-a-million-installs-on-google-play\/\">Joker malware<\/a> from the Play Store since 2017, but the malware keeps re-emerging and now six new malicious apps have been identified by <a href=\"https:\/\/blog.pradeo.com\/pradeo-identifies-app-joker-malware-google-play\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">researchers at cybersecurity company Pradeo<\/a>. <\/p>\n<p>Of the six apps uncovered as delivering Joker, one called &#8216;Convenient Scanner 2&#8217; has been downloaded over 100,000 times alone, while &#8216;Separate Doc Scanner&#8217; has been downloaded by 50,000 users. <\/p>\n<p>Another app, &#8216;Safety AppLock&#8217;, claims to &#8216;protect your privacy&#8217; and has been installed 10,000 times by unfortunate victims who will eventually find that the malicious download harms, rather than protects, them. <\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>Two more apps have also received 10,000 downloads each \u2013 &#8216;Push Message-Texting&amp;SMS&#8217; and &#8216;Emoji Wallpaper&#8217;, while one named Fingertip GameBox has been downloaded 1,000 times. <\/p>\n<p>The six apps have now been removed from the Play Store after being disclosed to Google by Pradeo. ZDNet has attempted to contact Google for comment; no response had been received at the time of publication. <\/p>\n<p>Users who have any of the applications on their Android smartphone are urged to remove them immediately. <\/p>\n<p>The six apps are just the latest in a long line of malicious downloads that the group behind Joker \u2013 also known as Bread \u2013 have attempted to sneak into the Play Store. <\/p>\n<p><a href=\"https:\/\/security.googleblog.com\/2020\/01\/pha-family-highlights-bread-and-friends.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">A previous blog post by Google&#8217;s Android security and privacy team<\/a> describes Joker as one of the most persistent threats the Play Store faces, with the attackers behind it having &#8220;at some point used just about every cloaking and obfuscation technique under the sun in an attempt to go undetected&#8221;.&nbsp;<\/p>\n<p>They also note that the sheer number of attempted submissions to the Play Store is one of the reasons it has remained so successful, with up to 23 different apps submitted a day during peak times. <\/p>\n<p><strong>SEE: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/google-details-its-fight-against-the-bread-joker-malware-operation\/\"><strong>Google details its three-year fight against the Bread (Joker) malware operation<\/strong><\/a> <\/p>\n<p>In many cases, the malicious apps have been able to bypass the defences of the Play Store by submitting clean apps to begin with, only to add malicious functionalities at a later date. <\/p>\n<p>&#8220;These apps are riddled with permission requests and submitted to Google Play by their developers. They get approved, published and installed by users. Once running on users&#8217; devices, they automatically download malicious code,&#8221; Pradeo&#8217;s Roxane Suau told ZDNet.&nbsp;<\/p>\n<p>&#8220;Then, they leverage their numerous permissions to execute the malicious code. Security checks of these apps&#8217; source code as it is published on the store do not detect the malware, because it&#8217;s not there yet,&#8221; she added. <\/p>\n<p>The authors of Joker attempt to encourage downloads of the malware by entering fake positive reviews \u2013 although many of the apps identified by Pradeo also have many negative reviews by users who&#8217;ve fallen victim to the malware, something that users should look out for when downloading apps. <\/p>\n<p>The individual or group behind Joker is highly likely to still be active and attempting to trick more users into downloading malware in order to continue the fraud operation. <\/p>\n<h3> <strong><strong>MORE ON CYBERSECURITY<\/strong><\/strong> <\/h3>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31537\/Six-More-Apps-Containing-Joker-Malware-Removed-From-The-Google-Play-Store.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36994,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1337],"class_list":["post-36993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarephonegoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Six More Apps Containing Joker Malware Removed From The Google Play Store 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Six More Apps Containing Joker Malware Removed From The Google Play Store 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-02T14:51:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Six More Apps Containing Joker Malware Removed From The Google Play Store\",\"datePublished\":\"2020-09-02T14:51:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg\",\"keywords\":[\"headline,malware,phone,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/\",\"name\":\"Six More Apps Containing Joker Malware Removed From The Google Play Store 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg\",\"datePublished\":\"2020-09-02T14:51:16+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,phone,google\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarephonegoogle\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Six More Apps Containing Joker Malware Removed From The Google Play Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six More Apps Containing Joker Malware Removed From The Google Play Store 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/","og_locale":"en_US","og_type":"article","og_title":"Six More Apps Containing Joker Malware Removed From The Google Play Store 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-02T14:51:16+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Six More Apps Containing Joker Malware Removed From The Google Play Store","datePublished":"2020-09-02T14:51:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/"},"wordCount":651,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg","keywords":["headline,malware,phone,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/","url":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/","name":"Six More Apps Containing Joker Malware Removed From The Google Play Store 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg","datePublished":"2020-09-02T14:51:16+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/six-more-apps-containing-joker-malware-removed-from-the-google-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,phone,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarephonegoogle\/"},{"@type":"ListItem","position":3,"name":"Six More Apps Containing Joker Malware Removed From The Google Play Store"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36993"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36993\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36994"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36993"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}