{"id":81800,"date":"2017-11-01T06:00:59","date_gmt":"2017-11-01T13:00:59","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=81800"},"modified":"2025-06-03T21:54:33","modified_gmt":"2025-06-04T04:54:33","slug":"pirated-android-apps-abuse-virtualization-to-pose-as-legitimate","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/","title":{"rendered":"Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization"},"content":{"rendered":"<p>The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated app is one distributed usually outside of the official store as a free version of a legitimate app. Paid legitimate applications are leading targets of pirated versions. In this case, however, we found pirated copies being distributed on the official market.<\/p>\n<p>The four pirated apps we found are developed by AE-funStudios, which offers versions of the common tool and games Flashlight, Race Car, Gun Shoot, and Chess. The download numbers of these apps are between 10,000\u2013100,000. We contacted Google about these pirated apps; they were promptly removed from the Google Play store.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81803 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\" alt=\"\" width=\"716\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg 716w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1-300x138.jpg 300w\" sizes=\"auto, (max-width: 716px) 100vw, 716px\" \/><\/a><\/p>\n<p>How do we know these apps are pirated versions? Let&#8217;s look at their structure. The following screenshot shows the pirated version of Chess, com.chess.chessfree.chessboard.chessgame.free.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81804 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-2.jpg\" alt=\"\" width=\"347\" height=\"458\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-2.jpg 347w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-2-227x300.jpg 227w\" sizes=\"auto, (max-width: 347px) 100vw, 347px\" \/><\/a><\/p>\n<p>In this app, we find the file ttttt in the assets folder. The file has no extension, but the format is APK, and in this case is the legitimate app Chess Free from a different developer. The bogus filename is already suspicious.<\/p>\n<p>The pirate app attempts to create a virtual space using the class VirtualCore, installing the legitimate app in the virtualization space, and running it after it launches.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81805 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-3.jpg\" alt=\"\" width=\"731\" height=\"378\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-3.jpg 731w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-3-300x155.jpg 300w\" sizes=\"auto, (max-width: 731px) 100vw, 731px\" \/><\/a><\/p>\n<p>The component com.lody.virtual is a piece of virtualization technology. The virtualization component <a href=\"https:\/\/github.com\/asLody\/VirtualApp\" target=\"_blank\" rel=\"noopener\">VirtualApp<\/a> is published on github as open source. Thus the component itself is not malicious. It is a similar technology to <a href=\"https:\/\/developer.android.com\/topic\/instant-apps\/index.html\" target=\"_blank\" rel=\"noopener\">Instant App<\/a>, introduced from Android 8.0 Oreo that provides a framework for running an application in a virtual space without installation. The component creates a virtual memory space in a local process, and loads and executes an APK file in the memory space.<\/p>\n<p>The pirated app makes the legitimate app in the assets folder behave like a part of the application by using the virtualization component, without installing the legitimate app on the device. Using this framework, the malware author can generate a new Trojan without repackaging (disassembling an app, inserting malware code, and rebuilding it as new package).<\/p>\n<p>However, the virtualization technique is not the perfect framework for all Android apps. Those with diversion protection and complex structures will not run in a virtual space. By applying app protection technology against repackaging, for example, we believe that the risk of a legitimate application being abused will become very low.<\/p>\n<p>Let\u2019s consider the intent of the pirated app\u2019s author. In the following screenshot, it appears the author intends to earn income from mobile app advertisements. From our investigation, however, the current versions of these pirated apps have no mechanisms to display advertisements or to intercept the communications of the related legitimate apps to gain the revenue. Perhaps this feature is under development for future updates.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-81806 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-4.png\" alt=\"\" width=\"330\" height=\"544\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-4.png 330w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-4-182x300.png 182w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-4-303x500.png 303w\" sizes=\"auto, (max-width: 330px) 100vw, 330px\" \/><\/a><\/p>\n<p>Another scenario is that the developer of the pirated apps might plan to sell the developer account to a criminal organization because, as <a href=\"http:\/\/www.ibtimes.co.uk\/there-black-market-charging-15000-instagram-verification-1637851\" target=\"_blank\" rel=\"noopener\">one website<\/a> points out, popular accounts such as those on Facebook and Instagram are traded at high prices in the black market just like <a href=\"https:\/\/www.mcafee.com\/us\/resources\/reports\/rp-hidden-data-economy.pdf\" target=\"_blank\" rel=\"noopener\">banking accounts and personal identity information<\/a>. The developer account could also be used for malware and spyware distribution. Each application affected by these four pirated apps is very popular, with the number of users between 1 million to 50 million. The pirated versions offer the same functionality as the legitimate apps to attract and retain users looking for original applications.<\/p>\n<h2>McAfee Mobile Security<\/h2>\n<p><a href=\"http:\/\/www.mcafeemobilesecurity.com\/\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security<\/a> detects these pirated apps as Android\/PUP.Pirates.C and protects user devices as well as the legitimate developers\u2019 rights. To further protect yourself against pirated apps, download only recommended and popular apps on official app stores, and pay attention to suspicious traits such as odd app titles, user-unfriendly descriptions, low-quality screenshots, and poor user reviews. Also, verify that an app\u2019s request for permissions is related to its functionality.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store. A pirated&#8230;<\/p>\n","protected":false},"author":547,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[37,4452,338,180],"coauthors":[2842],"class_list":["post-81800","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-android","tag-cybersecurity","tag-endpoint-protection","tag-malware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pirated Android Apps Abuse Virtualization to Pose as Legitimate<\/title>\n<meta name=\"description\" content=\"The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pirated Android Apps Abuse Virtualization to Pose as Legitimate\" \/>\n<meta property=\"og:description\" content=\"The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/yukihiro.okutomi\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-01T13:00:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T04:54:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"716\" \/>\n\t<meta property=\"og:image:height\" content=\"329\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yukihiro Okutomi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@yukihirokutomi\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yukihiro Okutomi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/\"},\"author\":{\"name\":\"Yukihiro Okutomi\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e094bc4cd9e86f4391793f454c9483d4\"},\"headline\":\"Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization\",\"datePublished\":\"2017-11-01T13:00:59+00:00\",\"dateModified\":\"2025-06-04T04:54:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\",\"keywords\":[\"android\",\"cybersecurity\",\"endpoint protection\",\"malware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/\",\"name\":\"Pirated Android Apps Abuse Virtualization to Pose as Legitimate\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\",\"datePublished\":\"2017-11-01T13:00:59+00:00\",\"dateModified\":\"2025-06-04T04:54:33+00:00\",\"description\":\"The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e094bc4cd9e86f4391793f454c9483d4\",\"name\":\"Yukihiro Okutomi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3faeb77b9f5d1d17a689faad49b7c9d5\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Yukihiro-e1504626982928-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Yukihiro-e1504626982928-96x96.jpg\",\"caption\":\"Yukihiro Okutomi\"},\"description\":\"Yukihiro Okutomi, Senior Mobile Malware Researcher, specializes in mobile malware research, analysis and detection. He is based in Tokyo, Japan, and keeps watching mobile threats in Japan in addition to world-wide mobile threats.\",\"sameAs\":[\"https:\/\/www.facebook.com\/yukihiro.okutomi\",\"https:\/\/www.linkedin.com\/in\/yukihiro-okutomi-2b7132116\/\",\"https:\/\/x.com\/yukihirokutomi\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/yukihiro-okutomi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pirated Android Apps Abuse Virtualization to Pose as Legitimate","description":"The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Pirated Android Apps Abuse Virtualization to Pose as Legitimate","og_description":"The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/yukihiro.okutomi","article_published_time":"2017-11-01T13:00:59+00:00","article_modified_time":"2025-06-04T04:54:33+00:00","og_image":[{"width":716,"height":329,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg","type":"image\/jpeg"}],"author":"Yukihiro Okutomi","twitter_card":"summary_large_image","twitter_creator":"@yukihirokutomi","twitter_site":"@McAfee","twitter_misc":{"Written by":"Yukihiro Okutomi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/"},"author":{"name":"Yukihiro Okutomi","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e094bc4cd9e86f4391793f454c9483d4"},"headline":"Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization","datePublished":"2017-11-01T13:00:59+00:00","dateModified":"2025-06-04T04:54:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/"},"wordCount":653,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg","keywords":["android","cybersecurity","endpoint protection","malware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/","name":"Pirated Android Apps Abuse Virtualization to Pose as Legitimate","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg","datePublished":"2017-11-01T13:00:59+00:00","dateModified":"2025-06-04T04:54:33+00:00","description":"The McAfee Mobile Research team recently found pirated applications of popular apps distributed on the Google Play store.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/10\/20171030-Pirated-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pirated-android-apps-abuse-virtualization-to-pose-as-legitimate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Pirate Versions of Popular Apps Infiltrate Google Play via Virtualization"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/e094bc4cd9e86f4391793f454c9483d4","name":"Yukihiro Okutomi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/3faeb77b9f5d1d17a689faad49b7c9d5","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Yukihiro-e1504626982928-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/04\/Yukihiro-e1504626982928-96x96.jpg","caption":"Yukihiro Okutomi"},"description":"Yukihiro Okutomi, Senior Mobile Malware Researcher, specializes in mobile malware research, analysis and detection. He is based in Tokyo, Japan, and keeps watching mobile threats in Japan in addition to world-wide mobile threats.","sameAs":["https:\/\/www.facebook.com\/yukihiro.okutomi","https:\/\/www.linkedin.com\/in\/yukihiro-okutomi-2b7132116\/","https:\/\/x.com\/yukihirokutomi"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/yukihiro-okutomi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/547"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=81800"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81800\/revisions"}],"predecessor-version":[{"id":215046,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/81800\/revisions\/215046"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=81800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=81800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=81800"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=81800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}