CyberHappenings logo
☰

Track cybersecurity events as they unfold. Sourced timelines, daily updates. Fast, privacy‑respecting. No ads, no tracking.

Google to Require Developer Verification for Android Apps in Four Countries

First reported
Last updated
πŸ“° 1 unique sources, 1 articles

Summary

Hide β–²

Google will require all developers to verify their identity to distribute apps on Android devices in Brazil, Indonesia, Singapore, and Thailand. This policy aims to enhance security by preventing malicious actors from distributing harmful apps. The verification process will start in October 2025 and will be mandatory by September 2026. The measure targets apps distributed outside the Google Play Store, where malicious apps often bypass security checks. Existing Play Store developers are likely already compliant. This initiative complements other security measures and follows recent regulatory pressures.

Timeline

  1. 26.08.2025 09:27 πŸ“° 1 articles Β· ⏱ 21d ago

    Google to Mandate Developer Verification for Android Apps in Four Countries

    Google announced a new policy requiring developer verification for apps distributed on Android devices in Brazil, Indonesia, Singapore, and Thailand. The verification process will begin in October 2025 and will be mandatory by September 2026. This measure aims to prevent malicious actors from distributing harmful apps by requiring identity verification. Existing Play Store developers are likely already compliant, and the policy complements other security protocols.

    Show sources

Information Snippets

Similar Happenings

SlopAds Fraud Ring Exploits 224 Android Apps to Drive 2.3 Billion Daily Ad Bids

A fraudulent ad operation, SlopAds, has been identified, exploiting 224 Android apps to generate 2.3 billion ad bids daily. The apps, collectively downloaded 38 million times across 228 countries, use steganography and hidden WebViews to create fraudulent ad impressions and clicks. The operation was disrupted after Google removed the offending apps from the Play Store. The SlopAds campaign is notable for its sophisticated tactics, including conditional fraud execution and the use of AI-themed services for command and control. The fraudulent behavior is triggered only when apps are downloaded via ad clicks, making detection more challenging. The campaign's infrastructure includes multiple domains and a complex feedback loop designed to evade security researchers. The campaign's highest concentration of ad impressions originated from the United States (30%), followed by India (10%) and Brazil (7%).

TamperedChef Malware Campaign Targets Users via Fake PDF Editors

A cybercrime campaign using malvertising to distribute a new information stealer called TamperedChef has been discovered. The malware is disguised as a fake PDF editor, AppSuite PDF Editor, and is designed to steal sensitive data, including credentials and web cookies. The campaign began on June 26, 2025, with malicious capabilities activated on August 21, 2025. The malware operates as a backdoor, supporting various features for data exfiltration and system manipulation. The campaign involves multiple fraudulent websites promoting the PDF editor, which, once installed, makes covert requests to an external server to drop the PDF editor program and set up persistence on the host. The malware gathers information about installed security products and attempts to terminate web browsers to access sensitive data. The campaign includes more than 50 domains and apps signed with fraudulent certificates from at least four companies. The threat actor has been active since at least August 2024, promoting other tools like OneStart and Epibrowser, which can turn hosts into residential proxies.