Over a million developers have joined DZone.

How to remove Android malware (DroidDream)

DZone's Guide to

How to remove Android malware (DroidDream)

· Mobile Zone ·
Free Resource
More than 50 applications on Google's Android Market have been discovered to be infected with malware called " DroidDream" which can compromise personal data by taking over the user's device, and have been "suspended" from the store.

Below a full list of infected apps:

Full list of infected applications published by "Myournet": • Falling Down • Super Guitar Solo • Super History Eraser • Photo Editor • Super Ringtone Maker • Super Sex Positions • Hot Sexy Videos • Chess • 下坠滚球_Falldown • Hilton Sex Sound • Screaming Sexy Japanese Girls • Falling Ball Dodge • Scientific Calculator • Dice Roller • 躲避弹球 • Advanced Currency Converter • App Uninstaller • 几何战机_PewPew • Funny Paint • Spider Man • 蜘蛛侠

Malware on AndroidFull list of infected applications published by "Kingmall2010″: • Bowling Time • Advanced Barcode Scanner • Supre Bluetooth Transfer • Task Killer Pro • Music Box • Sexy Girls: Japanese • Sexy Legs • Advanced File Manager • Magic Strobe Light • 致命绝色美腿 • 墨水坦克Panzer Panic • 裸奔先生Mr. Runner • 软件强力卸载 • Advanced App to SD • Super Stopwatch & Timer • Advanced Compass Leveler • Best password safe • 掷骰子 • 多彩绘画

Full list of infected apps under the developer name "we20090202″: • • Finger Race • Piano • Bubble Shoot • Advanced Sound Manager • Magic Hypnotic Spiral • Funny Face • Color Blindness Test • Tie a Tie • Quick Notes • Basketball Shot Now • Quick Delete Contacts • Omok Five in a Row • Super Sexy Ringtones • 大家来找茬 • 桌上曲棍球 • 投篮高手

First of all i would recommend that you search your phone for any of the above apps and remove them!.


Malware found warning Lookout Free

Malware found

Secondly you need to install an antivirus app on you smartphone / tablet:

It looks like the openness of Android also has his downsides. Atleast its comforting to see that all the apps were removed within 5 minutes after Google was notified!

UPDATE: A wonderfull guy at the XDA forums wrote a Malware exploit patch. Head over to the thread and check it out: http://forum.xda-developers.com/showthread.php?t=977154

Quote from XDA link above:

I asked our resident hacker to take a look at the code himself, and he’s verified it does indeed root the user’s device via rageagainstthecage or exploid. But that’s just the tip of the iceberg: it does more than just yank IMEI and IMSI. There’s another APK hidden inside the code, and it steals nearly everything it can: product ID, model, partner (provider?), language, country, and userID. But that’s all child’s play; the true pièce de résistance is that it has the ability to download more code. In other words, there’s no way to know what the app does after it’s installed, and the possibilities are nearly endless.

Quote 2:

We should point out that this vulnerability was patched with Gingerbread, meaning any device running Android 2.3+ should be fine.

Also, devices running 2.2.1 are safe. Not only 2.3 is patched. Android 2.2 is, however, still vulnerable!


Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}