Google to Require Developer Verification for Android Apps in Four Countries
Summary
Hide β²
Show βΌ
Google will require all developers to verify their identity to distribute apps on Android devices in Brazil, Indonesia, Singapore, and Thailand. This policy aims to enhance security by preventing malicious actors from distributing harmful apps. The verification process will start in October 2025 and will be mandatory by September 2026. The measure targets apps distributed outside the Google Play Store, where malicious apps often bypass security checks. Existing Play Store developers are likely already compliant. This initiative complements other security measures and follows recent regulatory pressures.
Timeline
-
26.08.2025 09:27 π° 1 articles Β· β± 21d ago
Google to Mandate Developer Verification for Android Apps in Four Countries
Google announced a new policy requiring developer verification for apps distributed on Android devices in Brazil, Indonesia, Singapore, and Thailand. The verification process will begin in October 2025 and will be mandatory by September 2026. This measure aims to prevent malicious actors from distributing harmful apps by requiring identity verification. Existing Play Store developers are likely already compliant, and the policy complements other security protocols.
Show sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
Information Snippets
-
Google will require developer verification for apps distributed on Android devices in Brazil, Indonesia, Singapore, and Thailand.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
-
The verification process will begin in October 2025 and will be mandatory by September 2026.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
-
The policy aims to prevent malicious actors from distributing harmful apps by requiring identity verification.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
-
Existing Google Play Store developers are likely already compliant with the new verification requirements.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
-
The measure complements existing security protocols that block sideloading of potentially dangerous apps.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
-
Google began requiring valid D-U-N-S numbers for new developer accounts in July 2023.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
-
The policy is part of broader security measures following an antitrust lawsuit and potential reforms to the Play Store.
First reported: 26.08.2025 09:27π° 1 source, 1 articleShow sources
- Google to Verify All Android Developers in 4 Countries to Block Malicious Apps β thehackernews.com β 26.08.2025 09:27
Similar Happenings
SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids
A fraudulent ad operation, SlopAds, has been identified, exploiting 224 Android apps to generate 2.3 billion ad bids daily. The apps, collectively downloaded 38 million times across 228 countries, use steganography and hidden WebViews to create fraudulent ad impressions and clicks. The operation was disrupted after Google removed the offending apps from the Play Store. The SlopAds campaign is notable for its sophisticated tactics, including conditional fraud execution and the use of AI-themed services for command and control. The fraudulent behavior is triggered only when apps are downloaded via ad clicks, making detection more challenging. The campaign's infrastructure includes multiple domains and a complex feedback loop designed to evade security researchers. The campaign's highest concentration of ad impressions originated from the United States (30%), followed by India (10%) and Brazil (7%).
TamperedChef Malware Campaign Targets Users via Fake PDF Editors
A cybercrime campaign using malvertising to distribute a new information stealer called TamperedChef has been discovered. The malware is disguised as a fake PDF editor, AppSuite PDF Editor, and is designed to steal sensitive data, including credentials and web cookies. The campaign began on June 26, 2025, with malicious capabilities activated on August 21, 2025. The malware operates as a backdoor, supporting various features for data exfiltration and system manipulation. The campaign involves multiple fraudulent websites promoting the PDF editor, which, once installed, makes covert requests to an external server to drop the PDF editor program and set up persistence on the host. The malware gathers information about installed security products and attempts to terminate web browsers to access sensitive data. The campaign includes more than 50 domains and apps signed with fraudulent certificates from at least four companies. The threat actor has been active since at least August 2024, promoting other tools like OneStart and Epibrowser, which can turn hosts into residential proxies.