{"id":48980,"date":"2022-10-21T14:32:13","date_gmt":"2022-10-21T14:32:13","guid":{"rendered":"http:\/\/69d3287d-18ec-428a-ae83-f46b7c51416e"},"modified":"2022-10-21T14:32:13","modified_gmt":"2022-10-21T14:32:13","slug":"battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/","title":{"rendered":"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large c-shortcodeImage-hasCaption\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/9c8608efdc397e333cb9645cf575a129bd7c977d\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=768\" alt=\"a-woman-looking-at-her-smartphone\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/95f8cda1aaa06f0bf74e3a700d2df82ff6acf656\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1024\" alt=\"a-woman-looking-at-her-smartphone\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\" alt=\"a-woman-looking-at-her-smartphone\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\" alt=\"a-woman-looking-at-her-smartphone\" width=\"1200\" height=\"800.7550731477112\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----><figcaption>\n<div class=\"c-shortcodeImage_caption g-inner-spacing-right-small g-color-black\" readability=\"6\">\n<div class=\"c-ShortcodeContent\" readability=\"32\">\n<p>A woman looking thoughtful while looking at her smartphone.<\/p>\n<\/div>\n<\/div>\n<p> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Image: Getty\/Guido Mieth<\/span><\/figcaption><\/figure>\n<p>Sixteen Android apps downloaded by a combined total of over 20 million users have been removed from the Google Play store after it was discovered they contained malware which uses up data and drains batteries. &nbsp;<\/p>\n<p>The <a href=\"https:\/\/www.zdnet.com\/article\/what-is-malware-everything-you-need-to-know-about-viruses-trojans-and-malicious-software\/\" rel=\"follow\">malware<\/a> has been discovered by <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">cybersecurity researchers at McAfee<\/a> who reported them to Google. The apps are no longer available on Google Play \u2013 but users who&#8217;ve already downloaded the apps will still be infected unless they uninstall them.&nbsp;<\/p>\n<p>The apps are designed to look like utilities including flashlights, QR code readers, camera enhancers, unit converters, task managers and more. &nbsp;<\/p>\n<p>The apps contained clicker malware &#8211; malware which secretly runs in the background and clicks on illicit advertising links to generate ad revenue.&nbsp;<\/p>\n<p>While clicker malware might not be as dangerous to users as malware which <a href=\"https:\/\/www.zdnet.com\/article\/be-careful-what-you-download-17-password-stealing-android-apps-removed-from-google-play\/\" rel=\"follow\">steals passwords<\/a> or <a href=\"https:\/\/www.zdnet.com\/article\/this-android-banking-trojan-malware-can-now-also-infect-your-smartphone-with-ransomware\/\" rel=\"follow\">bank details<\/a>, it still causes disruption by draining the battery or using up mobile data. The latter could cost victims money if it takes them over their data allowance and they&#8217;re charged for it.&nbsp;<\/p>\n<p><strong>Also: <\/strong><a href=\"https:\/\/www.zdnet.com\/article\/how-to-keep-your-bank-details-and-finances-more-secure-online\/\" rel=\"follow\">How to keep your bank details and finances more secure online<\/a><\/p>\n<p>Some of the apps which have been identified as delivering clicker malware include apps called currency converter, image vault, camera and more. <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The full list including package names has been detailed by the McAfee mobile research team.<\/a> &nbsp;<\/p>\n<p>Some of the applications have been individually downloaded by millions of Android users.&nbsp;<\/p>\n<p>For example, one app installed by over 5 million users claimed to enable them to find apps which eat a lot of data, although of course the malware inside the app was exactly the sort of thing that would uses up data.&nbsp;<\/p>\n<p>To avoid being detected, the malware delays initially starting the malicious activity for at least an hour and after that it detects whether the user is actively using their device or not, so the malicious activity doesn&#8217;t take place when the device is being looked at.&nbsp;<\/p>\n<p>It&#8217;s recommended that users who&#8217;ve installed apps listed as containing clicker malware uninstall them as quickly as possible.<\/p>\n<p>&#8220;Once you remove this and other malicious applications, you can expect an extended battery time and you will notice reduced mobile data usage while ensuring that your sensitive and personal data is protected from this and other types of threats,&#8221; said McAfee&#8217;s SangRyol Ryu.&nbsp;<\/p>\n<p>ZDNET has contacted Google for comment but is yet to receive a response at the time of publication.&nbsp;<\/p>\n<p><strong>MORE ON CYBERSECURITY<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers at McAfee identity apps which infect users with malware for adware fraud &#8211; users are urged to uninstall them as soon as possible.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48980","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Battery-draining Android apps with 20 million downloads pulled from the Google Play Store 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T14:32:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store\",\"datePublished\":\"2022-10-21T14:32:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/\"},\"wordCount\":444,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\\\/2022\\\/10\\\/21\\\/ab200d82-758e-4826-8e3b-4c6625bc5266\\\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/\",\"name\":\"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\\\/2022\\\/10\\\/21\\\/ab200d82-758e-4826-8e3b-4c6625bc5266\\\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-10-21T14:32:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\\\/2022\\\/10\\\/21\\\/ab200d82-758e-4826-8e3b-4c6625bc5266\\\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\\\/2022\\\/10\\\/21\\\/ab200d82-758e-4826-8e3b-4c6625bc5266\\\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/","og_locale":"en_US","og_type":"article","og_title":"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-10-21T14:32:13+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store","datePublished":"2022-10-21T14:32:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/"},"wordCount":444,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/","url":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/","name":"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200","datePublished":"2022-10-21T14:32:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/424b61b19cf2cda2fc7da5f60f52deb2d8181680\/2022\/10\/21\/ab200d82-758e-4826-8e3b-4c6625bc5266\/a-woman-looking-at-her-smartphone.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/battery-draining-android-apps-with-20-million-downloads-pulled-from-the-google-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Battery-draining Android apps with 20 million downloads pulled from the Google Play Store"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48980"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48980\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}