In a recent security revelation, cybersecurity experts at McAfee have identified a covert Android backdoor named ‘Xamalicious,’ spreading its infection to over 338,000 devices through malicious apps hosted on Google Play. Despite the removal of 14 infected apps from the official app store, users who installed them since mid-2020 may still be at risk, requiring immediate action for manual cleanup and scanning.

Scope of the Threat:
McAfee’s investigation points out that the infected apps, including popular ones such as “Essential Horoscope for Android” and “Logo Maker Pro,” have collectively amassed over 100,000 installs each. This emphasizes the potential scale of the threat, impacting a significant number of Android users.
Unapproved Third-Party Stores and Global Impact:
Notably, Xamalicious is not confined to Google Play alone. Twelve additional malicious apps carrying the same threat are being spread through unapproved third-party app stores, where users unknowingly download APK (Android package) files, exposing their devices to the backdoor. Geographical data from McAfee’s telemetry indicates that the infections are widespread, affecting devices predominantly in the United States, Germany, Spain, the UK, Australia, Brazil, Mexico, and Argentina.
Xamalicious: A Stealthy Backdoor:
Xamalicious, a.NET-based Android backdoor, is concealed within apps built using the open-source Xamarin framework. This unique approach makes code analysis challenging for cybersecurity experts. Upon installation, Xamalicious gains Accessibility Service access, allowing it to execute privileged operations such as navigation gestures and hiding on-screen objects.
Command and Control Server Interaction:
After successful installation, Xamalicious establishes communication with a Command and Control (C2) server. If specific conditions related to geography, network, device configuration, and root status are met, it retrieves a second-stage DLL payload known as ‘cache.bin.’ This interaction further underscores the sophistication of the threat.
Staying Safe:
Given the potential risks associated with Xamalicious, users are strongly advised to:
- Remove Infected Apps: Uninstall any apps identified as carrying the Xamalicious threat, even if they have been removed from Google Play.
- Manual Cleanup and Scanning: Users who installed these apps since mid-2020 should perform manual cleanup and thorough scanning to ensure the removal of any potential infections.
- Vigilance in App Downloads: Exercise caution while downloading apps, even from official app stores. Avoid downloading APK files from unapproved third-party sources.
Conclusion:
The discovery of ‘Xamalicious’ highlights the ongoing challenges in maintaining mobile device security. As cyber threats evolve in sophistication, users are urged to stay vigilant, regularly check for potential threats on their devices, and adopt best practices in app downloading and usage.
This incident serves as a stark reminder of the importance of cybersecurity awareness in an increasingly interconnected digital landscape. Stay informed, stay safe.
Register for My Upcoming Masterclass HERE
See You in the Live Masterclass
Sunil Chaudhary stands as a preeminent global Leading digital coach, boasting a diverse clientele hailing from over 50 nations. Renowned for his prowess as an exemplary SEO expert, business automation coach, and landing page authority, Chaudhary also holds the distinction of being esteemed as the finest business coach in India. Beyond technical domains, he imparts invaluable insights into mindset, success, and life skills, thus encompassing a holistic approach to mentorship.









