{"id":254064,"date":"2022-07-27T18:18:29","date_gmt":"2022-07-27T18:18:29","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/es\/?p=254064"},"modified":"2025-06-12T22:01:58","modified_gmt":"2025-06-12T20:01:58","slug":"nuevo-malware-de-android-instalado-10-millones-de-veces","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/es\/nuevo-malware-de-android-instalado-10-millones-de-veces\/","title":{"rendered":"Nuevo malware en Android instalado 10 millones de veces"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Malas noticias las que traemos en el d\u00eda de hoy. Por desgracia, se ha localizado en la <strong>Google Play Store<\/strong> un nuevo lote de apps que posee <strong>malware<\/strong> en su interior. Y el problema es a\u00fan mayor, ya que se sabe que han sido instaladas unos <strong>10 millones de veces<\/strong>, es decir, casi 10 millones de dispositivos m\u00f3viles tienen ahora este malware (si no han tomado medida).<\/p>\n\n\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_app-logo-xl,f_auto,dpr_2\/p\/7cedafd5-5f69-4b4a-be0c-960570ebcd03\/3258650650\/android-13-Android%2013-icon.png\" alt=\"Android 13\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Android 13<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/android-13.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">DESCARGAR<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--40\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"40\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"4\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">4<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/android-13.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">La noticia la hemos conocido gracias al equipo de <strong>Dr. Web<\/strong> y v\u00eda el portal <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-android-malware-apps-installed-10-million-times-from-google-play\/\" target=\"_blank\" rel=\"noreferrer noopener\" title=\"BleepingComputer\">BleepingComputer<\/a>, que en el d\u00eda de hoy ha informado con todo lujo de detalles. Seg\u00fan cuentan, las aplicaciones se hacen pasar por una gran cantidad de herramientas diferentes, v\u00e9ase edici\u00f3n de im\u00e1genes, teclados virtuales, optimizadores del sistema, cambios de fondo de pantalla y mucho m\u00e1s. No obstante, detr\u00e1s de estas funcionalidades&#8230; viene lo realmente peliagudo.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">El funcionamiento de este malware, detectado en mayo, era el siguiente. Cuando instal\u00e1bamos estas aplicaciones y las comenz\u00e1bamos a utilizar, en pantalla aparec\u00eda <strong>un mensaje para dar acceso a la herramienta en cuesti\u00f3n<\/strong>. La clave est\u00e1 en que utilizaba un lenguaje muy &#8220;conveniente&#8221;, ya que se nos dec\u00eda que &#8220;si manten\u00edamos la app abierta, la bater\u00eda se pod\u00eda resentir&#8221;. Nos preguntaba si quer\u00edamos permitir esto o no&#8230; y ah\u00ed entraba el conflicto.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Por otro lado, la app tambi\u00e9n<strong> cambiaba algunos iconos de los que ten\u00edamos en pantalla<\/strong>, todo sin darnos cuenta. De esta manera, se mov\u00edan de sitio algunos ya instalados para ponernos algunos de su inter\u00e9s. C\u00f3mo no, todo con fin perjudicial para nuestros intereses.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Google ha eliminado casi todas las apps, pero hay algunas que todav\u00eda quedan. Este es el listado completo para que no caigas:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Photo Editor: Beauty Filter (gb.artfilter.tenvarnist)<\/li><li>Photo Editor: Retouch &amp; Cutout (de.nineergysh.quickarttwo)<\/li><li>Photo Editor: Art Filters (gb.painnt.moonlightingnine)<\/li><li>Photo Editor &#8211; Design Maker (gb.twentynine.redaktoridea)<\/li><li>Photo Editor &amp; Background Eraser (de.photoground.twentysixshot)<\/li><li>Photo &amp; Exif Editor (de.xnano.photoexifeditornine)<\/li><li>Photo Editor &#8211; Filters Effects (de.hitopgop.sixtyeightgx)<\/li><li>Photo Filters &amp; Effects (de.sixtyonecollice.cameraroll)<\/li><li>Photo Editor : Blur Image (de.instgang.fiftyggfife)<\/li><li>Photo Editor : Cut, Paste (de.fiftyninecamera.rollredactor)<\/li><li>Emoji Keyboard: Stickers &amp; GIF (gb.crazykey.sevenboard)<\/li><li>Neon Theme Keyboard (com.neonthemekeyboard.app)<\/li><li>Neon Theme &#8211; Android Keyboard (com.androidneonkeyboard.app)<\/li><li>Cashe Cleaner (com.cachecleanereasytool.app)<\/li><li>Fancy Charging (com.fancyanimatedbattery.app)<\/li><li>FastCleaner: Cashe Cleaner (com.fastcleanercashecleaner.app)<\/li><li>Call Skins &#8211; Caller Themes (com.rockskinthemes.app)<\/li><li>Funny Caller (com.funnycallercustomtheme.app)<\/li><li>CallMe Phone Themes (com.callercallwallpaper.app)<\/li><li>InCall: Contact Background (com.mycallcustomcallscrean.app)<\/li><li>MyCall &#8211; Call Personalization (com.mycallcallpersonalization.app)<\/li><li>Caller Theme (com.caller.theme.slow)<\/li><li>Caller Theme (com.callertheme.firstref)<\/li><li>Funny Wallpapers &#8211; Live Screen (com.funnywallpapaerslive.app)<\/li><li>4K Wallpapers Auto Changer (de.andromo.ssfiftylivesixcc)<\/li><li>NewScrean: 4D Wallpapers (com.newscrean4dwallpapers.app)<\/li><li>Stock Wallpapers &amp; Backgrounds (de.stockeighty.onewallpapers)<\/li><li>Notes &#8211; reminders and lists (com.notesreminderslists.app)<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Malas noticias las que traemos en el d\u00eda de hoy. Por desgracia, se ha localizado en la Google Play Store un nuevo lote de apps que posee malware en su interior. Y el problema es a\u00fan mayor, ya que se sabe que han sido instaladas unos 10 millones de veces, es decir, casi 10 millones &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/es\/nuevo-malware-de-android-instalado-10-millones-de-veces\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Nuevo malware en Android instalado 10 millones de veces&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9211,"featured_media":254065,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[9317],"tags":[10325],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-254064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-app-subdomain-redirectionandroid-13"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/254064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/users\/9211"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/comments?post=254064"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/254064\/revisions"}],"predecessor-version":[{"id":367395,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/254064\/revisions\/367395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media\/254065"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media?parent=254064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/categories?post=254064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/tags?post=254064"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/usertag?post=254064"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/vertical?post=254064"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/content-category?post=254064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}