Two Android Malware apps, Superclean and “a twin brother,” DroidCleaner, bill themselves as apps that can free up memory on phones, in turn helping them to run faster. They don’t do that at all. Instead, once a user syncs his or her phone with a PC, say to update a music playlist, or for any reason, the malware is installed on the PC, and can infect workstations.

DroidCleaner – Android Malware App
DroidCleaner-Android-and-PC-Malware


Superclean – Android Malware App
superclean-android-malware

This above apps are removed from Google Play. Above pictures are captured when these apps are available on google play now these two app are removed by Google play. Android users always need to be cautious about the software they download and install.

The malware was capable of more than just eavesdropping. As detailed by Kaspersky, the apps offered the following repertoire.

Also Read : Top Android Apps You Can Use For Spying

The malware includes these features:

  • Sending SMS messages
  • Enabling Wi-Fi
  • Gathering information about the device
  • Opening arbitrary links in a browser
  • Uploading the SD card’s entire contents
  • Uploading an arbitrary file (or folder) to the master’s server
  • Uploading all SMS messages
  • Deleting all SMS messages
  • Uploading all the contacts/photos/coordinates from the device to the master

“This is the first time we have seen such an extensive feature set in one mobile application,” Chebyshev writes.
NBC News contacted Google about the malware, which had been available in its online Google Play Store, but isn’t any longer.
“We don’t comment on individual apps; we remove apps from Google Play that violate our policies,” a Google spokesperson said.
Google Play is the main source of apps for Android, but there are plenty of websites out there where users can download mobile apps. Superclean and DroidCleaner no longer appear in Google Play. But their initial stay in the app store shows that Android users always need to be cautious about the software they download and install.

“A typical attack victim is the owner of an inexpensive Android smartphone who connects his or her smartphone to a PC from time to time, for example, to change the music files on the device,” the blog noted. “Judging by the sales statistics for Android smartphones, I would say that such people are quite numerous. For the attack to be more successful, it only lacks a broader distribution scheme.”