Google dismantles 9M-device Android hijack network

6 hours ago 2

NEWYou tin present perceive to Fox News articles!

Free apps are expected to outgo you thing but retention space. But successful this case, they whitethorn person outgo millions of radical power implicit their ain net connections.

Google says it has disrupted what it believes was the world's largest residential proxy network, 1 that secretly hijacked astir 9 cardinal Android devices, on with computers and astute location gadgets. Most radical had nary thought their devices were being utilized since the apps worked normally, and thing looked broken.

But down the scenes, those devices were softly routing postulation for strangers, including cybercriminals.

Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide – escaped erstwhile you articulation my CYBERGUY.COM newsletter.

STOP GOOGLE FROM FOLLOWING YOUR EVERY MOVE
 

A antheral   stands successful  beforehand   of a gathering  with a Google motion   implicit    the doors.

Google says it disrupted a monolithic residential proxy web that secretly hijacked astir 9 cardinal Android and astute devices. (AaronP/Bauer-Griffin/GC Images)

How your instrumentality became portion of a proxy network

According to Google's Threat Intelligence Group, the web was tied to a institution known arsenic IPIDEA. Instead of spreading done evident malware, it relied connected hidden bundle improvement kits, oregon SDKs, that were embedded wrong much than 600 apps. These apps ranged from elemental utilities to VPN tools and different escaped downloads. When you installed one, the app performed its advertised function. But it besides enrolled your instrumentality into a residential proxy network.

That means your phone, machine oregon astute instrumentality could beryllium utilized arsenic a relay constituent for idiosyncratic else's net traffic. That postulation mightiness see scraping websites, launching automated login attempts oregon masking the individuality of idiosyncratic conducting shady online activity. From the outside, it looked similar that enactment came from your location IP address. You wouldn't spot it happening, and successful galore cases, you wouldn't announcement immoderate large show issues.

Google says successful a azygous seven-day play earlier this year, much than 550 abstracted menace groups were observed utilizing IP addresses linked to this infrastructure. That includes cybercrime operations and state-linked actors. Residential proxy networks are charismatic due to the fact that they marque malicious postulation look similar mean user activity. Instead of coming from a suspicious information center, it appears to travel from someone's surviving room.

What Google did to unopen it down

Google says it took ineligible enactment successful a U.S. national tribunal to prehend domains utilized to power the infected devices and way proxy traffic. It besides worked with companies similar Cloudflare and different information firms to disrupt the network's command-and-control systems. Google claims it besides updated Play Protect, the built-in Android information system, truthful that certified devices would automatically observe and region apps known to see the malicious SDKs.

However, Google besides warned that galore of these apps were distributed extracurricular the authoritative Play Store. That matters due to the fact that Play Protect tin lone scan and artifact threats tied to apps installed done Google Play. Third-party app stores, unofficial downloads and uncertified Android devices transportation acold greater risk.

IPIDEA has claimed its work was meant for morganatic concern use, specified arsenic web probe and information collection. But Google's probe suggests the web was heavy abused by criminals. Even if immoderate users knowingly installed bandwidth-sharing apps successful speech for rewards, galore did not person wide disclosure astir however their devices were being used.

Google's probe besides recovered important overlap betwixt antithetic proxy brands and SDK names. What looked similar abstracted services were often tied to the aforesaid infrastructure. That makes it harder for consumers to cognize which apps are harmless and which are softly monetizing their connection.

300,000 CHROME USERS HIT BY FAKE AI EXTENSIONS
 

Samsung phones beryllium   connected  display.

Hidden bundle wrong much than 600 apps allegedly turned phones and computers into net relays for cybercriminals. (David Paul Morris/Bloomberg via Getty Images)

7 ways you tin support yourself from Android proxy attacks

If millions of devices tin beryllium softly turned into net relay points, the large question is, however bash you marque definite yours isn't 1 of them? These steps trim the hazard that your phone, TV container oregon astute instrumentality gets pulled into a proxy web without you realizing it.

1) Stick to authoritative app stores

Only download apps from the Google Play Store oregon different trusted app marketplaces. Some apps fell tiny pieces of codification that tin secretly usage your net connection. These are often dispersed done third-party app stores oregon nonstop app files called "APKs," which are Android app files installed manually alternatively of done the Play Store. When you sideload apps this way, you bypass Google's built-in information checks. Sticking to authoritative stores helps support those hidden threats disconnected your device.

2) Avoid "earn wealth by sharing bandwidth" apps

If an app promises rewards for sharing your unused net bandwidth, that's a large reddish flag. In galore cases, that is precisely however residential proxy networks enlistee devices. Even if it sounds legitimate, you are efficaciously renting retired your IP address. That tin exposure you to abuse, blacklisting oregon deeper web vulnerabilities.

3) Review app permissions carefully

Before installing immoderate app, cheque what permissions it requests. A elemental wallpaper app should not request afloat web power oregon inheritance execution privileges. After installation, spell into your phone's settings and audit which apps person changeless net access, inheritance enactment rights oregon peculiar instrumentality permissions.

4) Install beardown antivirus software

Today's mobile information tools tin observe suspicious app behavior, antithetic net enactment and hidden inheritance services. Strong antivirus bundle adds an other furniture of extortion beyond what's built into your device, particularly if you've installed apps successful the past that you're unsure about. Get my picks for the champion 2026 antivirus extortion winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Keep your devices updated

Android information updates spot vulnerabilities that proxy operators whitethorn exploit. If you're utilizing an older phone, tablet oregon Android TV container that nary longer receives updates, it whitethorn beryllium clip to upgrade. Unpatched devices are easier targets for hidden SDK maltreatment and botnet enrollment.

6) Use a beardown password manager

If your instrumentality ever becomes portion of a proxy web oregon is different compromised, attackers often effort to pivot into your accounts next. That's wherefore you should ne'er reuse passwords. A password manager generates long, unsocial passwords for each relationship and stores them securely, truthful 1 breach does not unlock your email, banking oregon societal media. Many password managers besides see breach monitoring tools that alert you if your credentials look successful leaked databases, giving you a accidental to enactment earlier existent harm is done. Check retired the champion expert-reviewed password managers of 2026 at Cyberguy.com.

7) Remove apps you don't afloat trust

Go done your installed apps and delete oregon uninstall thing you don't admit oregon haven't utilized successful months. The less apps moving connected your device, the less opportunities determination are for hidden SDKs to operate. If you fishy your instrumentality has been compromised, see a afloat reset and reinstall lone indispensable apps from trusted sources.

ANDROID MALWARE HIDDEN IN FAKE ANTIVIRUS APP

A idiosyncratic   uses a laptop with a Google hunt  tab unfastened  connected  the screen.

Threat groups and state-linked actors allegedly utilized compromised devices to disguise online enactment and automate attacks. (Photo Illustration by Serene Lee/SOPA Images/LightRocket via Getty Images)

Kurt's cardinal takeaway

Residential proxy networks run successful a grey country that sounds harmless connected insubstantial but tin rapidly go a shield for cybercrime. In this case, millions of mundane devices were softly enrolled into a strategy that attackers utilized to fell their tracks. Google's takedown is simply a large move, but the broader marketplace for residential proxies is inactive growing. That means you request to beryllium cautious astir what you instal and what permissions you grant. Free apps are seldom genuinely free. Sometimes, the merchandise being sold is you and your net connection.

Have you ever installed an app that promised rewards for sharing bandwidth, oregon utilized a escaped VPN without reasoning doubly astir it? Let america cognize your thoughts by penning to america at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my champion tech tips, urgent information alerts and exclusive deals delivered consecutive to your inbox. Plus, you’ll get instant entree to my Ultimate Scam Survival Guide - escaped erstwhile you articulation my CYBERGUY.COM newsletter 

Copyright 2026 CyberGuy.com.  All rights reserved.

Related Article

Stop Google from pursuing  your each   move

Kurt "CyberGuy" Knutsson is an award-winning tech writer who has a heavy emotion of technology, cogwheel and gadgets that marque beingness amended with his contributions for Fox News & FOX Business opening mornings connected "FOX & Friends." Got a tech question? Get Kurt’s escaped CyberGuy Newsletter, stock your voice, a communicative thought oregon remark astatine CyberGuy.com.

Read Entire Article