{"id":311,"date":"2022-06-28T23:36:19","date_gmt":"2022-06-28T23:36:19","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=311"},"modified":"2022-06-28T23:36:19","modified_gmt":"2022-06-28T23:36:19","slug":"%ed%94%8c%eb%a0%88%ec%9d%b4-%ec%8a%a4%ed%86%a0%ec%96%b4%ec%97%90%ec%84%9c-%eb%b0%9c%ea%b2%ac%eb%90%9c-%ec%95%85%ec%84%b1%ec%bd%94%eb%93%9c-%ed%8f%ac%ed%95%a8-%ec%95%88%eb%93%9c%eb%a1%9c%ec%9d%b4","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9\/%ed%94%8c%eb%a0%88%ec%9d%b4-%ec%8a%a4%ed%86%a0%ec%96%b4%ec%97%90%ec%84%9c-%eb%b0%9c%ea%b2%ac%eb%90%9c-%ec%95%85%ec%84%b1%ec%bd%94%eb%93%9c-%ed%8f%ac%ed%95%a8-%ec%95%88%eb%93%9c%eb%a1%9c%ec%9d%b4\/","title":{"rendered":"Play \uc2a4\ud1a0\uc5b4\uc5d0\uc11c \uba40\uc6e8\uc5b4\uac00 \ubc1c\uacac\ub41c \uc548\ub4dc\ub85c\uc774\ub4dc \uc571"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Google Play Store is not a safe place for your Android phone. A recent report revealed that hackers infected at least 12 apps on the store with malware, which can steal personal information and cause lots of damage to your device or data if installed! So before downloading anything else, make sure it\u2019s from an official source like Google (unless otherwise specified).<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">\uc545\uc131 \ucf54\ub4dc\uac00 \ud3ec\ud568\ub41c \uc548\ub4dc\ub85c\uc774\ub4dc \uc571\uc740 \uc5b4\ub5bb\uac8c Google Play Store\uc5d0 \ub4e4\uc5b4\uac00\ub098\uc694?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">\uc774\ub7ec\ud55c \uc545\uc131 \ucf54\ub4dc\uac00 \ud3ec\ud568\ub41c \uc571\uc774 \uc5b4\ub5bb\uac8c \uc2a4\ud1a0\uc5b4\uc5d0 \ub4e4\uc5b4\uac14\ub294\uc9c0\ub294 \uc544\uc9c1 \ud655\uc2e4\ud558\uc9c0 \uc54a\uc2b5\ub2c8\ub2e4. \uc774\ub7ec\ud55c \uc571\uc758 \uac1c\ubc1c\uc790\ub4e4\uc740 \uc544\ub9c8\ub3c4 \uadf8\ub4e4\uc758 \ucf54\ub4dc\uc5d0 \uc545\uc131 \ucf54\ub4dc\uac00 \ud3ec\ud568\ub418\uc5b4 \uc788\ub294 \uac83\uc744 \uc778\uc9c0\ud558\uc9c0 \ubabb\ud588\uc744 \uac83\uc785\ub2c8\ub2e4. \ub610\ub294 \uad11\uace0 \uc218\uc775\uc744 \uc5bb\uae30 \uc704\ud574 \uace0\uc758\uc801\uc73c\ub85c \uc545\uc131 \ucf54\ub4dc\ub97c \ud3ec\ud568\uc2dc\ucf30\uc744 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \uc5b4\ub290 \ucabd\uc774\ub4e0, \ub2f9\uc2e0\uc758 \ud734\ub300\ud3f0\uc5d0 \uc124\uce58\ud558\ub294 \uc571\uc5d0 \ub300\ud574 \uc8fc\uc758\ud574\uc57c \ud569\ub2c8\ub2e4.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">\uc545\uc131 \uc571\uc73c\ub85c\ubd80\ud130 \uae30\uae30\ub97c \ubcf4\ud638\ud558\ub294 \ubc29\ubc95\uc740 \ubb34\uc5c7\uc778\uac00\uc694?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">\uc545\uc131 \uc571\uc73c\ub85c\ubd80\ud130 \uae30\uae30\ub97c \ubcf4\ud638\ud558\uae30 \uc704\ud574 \ud560 \uc218 \uc788\ub294 \uba87 \uac00\uc9c0 \ubc29\ubc95\uc774 \uc788\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">\ud734\ub300\ud3f0\uc5d0 \uc88b\uc740 \uc548\ud2f0\ubc14\uc774\ub7ec\uc2a4 \ud504\ub85c\uadf8\ub7a8\uc774 \uc124\uce58\ub418\uc5b4 \uc788\ub294\uc9c0 \ud655\uc778\ud558\uc138\uc694. \uc548\ud2f0\ubc14\uc774\ub7ec\uc2a4 \ud504\ub85c\uadf8\ub7a8\uc740 \uae30\uae30\uc5d0 \uc874\uc7ac\ud560 \uc218 \uc788\ub294 \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub97c \uc2a4\uce94\ud558\uace0 \uc81c\uac70\ud558\ub294 \ub370 \ub3c4\uc6c0\uc744 \uc90d\ub2c8\ub2e4.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Google Play Store\uc640 \uac19\uc740 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ucd9c\ucc98\uc5d0\uc11c\ub9cc \uc571\uc744 \ub2e4\uc6b4\ub85c\ub4dc\ud558\uc138\uc694.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">\uc571\uc744 \ub2e4\uc6b4\ub85c\ub4dc\ud558\uae30 \uc804\uc5d0 \ud56d\uc0c1 \ub9ac\ubdf0\ub97c \uc77d\uc73c\uc138\uc694.<\/span><\/li>\n<\/ol>\n<p><span data-preserver-spaces=\"true\">\ub9ac\ubdf0\ub97c \uc77d\uc73c\uba74 \uc571\uacfc \uad00\ub828\ub41c \uc7a0\uc7ac\uc801 \uc704\ud5d8\uc744 \uc2dd\ubcc4\ud558\ub294 \ub370 \ub3c4\uc6c0\uc774 \ub429\ub2c8\ub2e4.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\uc774\ub7ec\ud55c \uac04\ub2e8\ud55c \ud301\uc744 \ub530\ub974\uba74 \uc548\ub4dc\ub85c\uc774\ub4dc \ud3f0\uc744 \uc545\uc131 \ucf54\ub4dc \ubc0f \uae30\ud0c0 \uc704\ud611\uc73c\ub85c\ubd80\ud130 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub7ec\ub2c8 \ub2e4\uc74c \ubc88\uc5d0 \uc571\uc744 \ub2e4\uc6b4\ub85c\ub4dc\ud560 \ub54c \uc774\ub97c \uc5fc\ub450\uc5d0 \ub450\uc138\uc694.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">\uc545\uc131 \ucf54\ub4dc\uc5d0 \uac10\uc5fc\ub41c \uc571\uc740 \ubb34\uc5c7\uc774\uc5c8\ub098\uc694?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">\uac10\uc5fc\ub41c \ub2e4\uc12f \uac1c\uc758 \uc571\uc774 Play Store\uc5d0\uc11c \ub2e4\uc6b4\ub85c\ub4dc \uac00\ub2a5\ud588\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Wild &amp; Exotic Animal Wallpaper: \uc124\uce58 \ud6c4 SIM Tool Kit\uc73c\ub85c \uc774\ub984\uc744 \ubc14\uafb8\ub294 \uc560\ub4dc\uc6e8\uc5b4\uac00 \ud3ec\ud568\ub418\uc5b4 \uc788\uc2b5\ub2c8\ub2e4. \uc9c0\uae08\uae4c\uc9c0 500,000\ud68c \ub2e4\uc6b4\ub85c\ub4dc\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">PIP Pic Camera Photo Editor: This software is a phoney picture editor that steals users\u2019 Facebook passwords. Android users have already downloaded this program over 100,000 times.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">ZodiHoroscope: Facebook \uc790\uaca9 \uc99d\uba85\uc744 \ub178\ub9ac\ub294 \ub610 \ub2e4\ub978 \uc720\ud574 \ud504\ub85c\uadf8\ub7a8\uc785\ub2c8\ub2e4. \uc0ac\uc6a9\uc790\ub294 \uc774 \uc571\uc744 \uc57d 500,000\ud68c \ub2e4\uc6b4\ub85c\ub4dc\ud588\uc2b5\ub2c8\ub2e4.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">PIP Camera 2022: \ub2e4\uc591\ud55c \uce74\uba54\ub77c \ud6a8\uacfc\ub97c \uc81c\uacf5\ud55c\ub2e4\uace0 \uc8fc\uc7a5\ud558\ub294 \uc774 \uc571\uc740 \uc2e4\uc81c\ub85c 50,000\uba85\uc758 \uc0ac\uc6a9\uc790\ub85c\ubd80\ud130 Facebook \ud504\ub85c\ud544 \ub370\uc774\ud130\ub97c \ud6d4\uce58\ub294 \uc545\uc131 \ucf54\ub4dc\ub97c \ud3ec\ud568\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uc57d 50,000\uba85\uc774 \ub2e4\uc6b4\ub85c\ub4dc\ud588\uc2b5\ub2c8\ub2e4.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Magnifier Flashlight: \uc774 \uc545\uc131 \ud504\ub85c\uadf8\ub7a8\uc5d0\ub294 \uc560\ub4dc\uc6e8\uc5b4\uac00 \ud3ec\ud568\ub418\uc5b4 \uc788\uc73c\uba70, \uc57d 10,000\ud68c \ub2e4\uc6b4\ub85c\ub4dc\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/span><\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">\uc548\ub4dc\ub85c\uc774\ub4dc \uac1c\ubc1c\uc790\uac00 \uc545\uc131 \ucf54\ub4dc\ub97c \ud53c\ud560 \uc218 \uc788\ub294 \ubc29\ubc95<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">\uc548\ub4dc\ub85c\uc774\ub4dc \uac1c\ubc1c\uc790\ub77c\uba74, \uc571\uc5d0\uc11c \uc545\uc131 \ucf54\ub4dc\ub97c \ud53c\ud558\uae30 \uc704\ud574 \ud560 \uc218 \uc788\ub294 \uba87 \uac00\uc9c0 \ubc29\ubc95\uc774 \uc788\uc2b5\ub2c8\ub2e4:<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">\ud56d\uc0c1 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \uac1c\ubc1c \ub3c4\uad6c\uc640 \ud504\ub808\uc784\uc6cc\ud06c\ub97c \uc0ac\uc6a9\ud558\uc138\uc694.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">\ucf54\ub4dc\uc640 \uc885\uc18d\uc131\uc744 \ucd5c\uc2e0 \uc0c1\ud0dc\ub85c \uc720\uc9c0\ud558\uc138\uc694.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">\ud3c9\ud310\uc774 \uc88b\uc740 \ubaa8\ubc14\uc77c \ubcf4\uc548 \uc194\ub8e8\uc158\uc744 \uc0ac\uc6a9\ud558\uc5ec \ucf54\ub4dc\uc758 \uc7a0\uc7ac\uc801 \ucde8\uc57d\uc810\uc744 \uc2a4\uce94\ud558\uc138\uc694.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">\uc2e0\ub8b0\ud560 \uc218 \uc5c6\ub294 \ucd9c\ucc98\uc758 \ucf54\ub4dc\ub97c \uc808\ub300 \uc7ac\uc0ac\uc6a9\ud558\uc9c0 \ub9c8\uc138\uc694.<\/span><\/li>\n<\/ol>\n<p><span data-preserver-spaces=\"true\">\uc774\ub7ec\ud55c \uac04\ub2e8\ud55c \ud301\uc744 \ub530\ub974\uba74 \uc571\uc744 \uc545\uc131 \ucf54\ub4dc\ub85c\ubd80\ud130 \uc548\uc804\ud558\uac8c \uc720\uc9c0\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub9ac\uace0 \ub9cc\uc57d \uc571\uc774 \uc545\uc131 \ucf54\ub4dc\uc5d0 \uac10\uc5fc\ub41c \uac83\uc744 \ubc1c\uacac\ud558\uba74 \uc989\uc2dc \uc81c\uac70\ud558\uace0 \uc0ac\uc6a9\uc790\uc5d0\uac8c \uc54c\ub9ac\uc138\uc694.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">What was Google Play\u2019s response?<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">Google\uc740 \uac10\uc5fc\ub41c \uc571\uc744 Play Store\uc5d0\uc11c \uc81c\uac70\ud558\uace0 \uc774\ub7ec\ud55c \uc0ac\uac74\uc774 \ubc1c\uc0dd\ud558\uc9c0 \uc54a\ub3c4\ub85d \ubcf4\uc548 \uc870\uce58\ub97c \uac1c\uc120\ud558\uae30 \uc704\ud574 \ub178\ub825\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\ubaa8\ub4e0 \uc548\ub4dc\ub85c\uc774\ub4dc \uc0ac\uc6a9\uc790\uc5d0\uac8c \uae30\uae30\uc5d0 \ub2e4\uc6b4\ub85c\ub4dc \ubc0f \uc124\uce58\ud558\ub294 \uc571\uc5d0 \ub300\ud574 \uacbd\uacc4\ud560 \uac83\uc744 \uad8c\uc7a5\ud569\ub2c8\ub2e4. \uadf8\ub9ac\uace0 \uc545\uc131\uc774\ub77c\uace0 \uc758\uc2ec\ub418\ub294 \uc571\uc744 \ubc1c\uacac\ud558\uba74 Google\uc5d0 \ubcf4\uace0\ud558\uc138\uc694.<\/span><\/p>\n<h2><strong><span data-preserver-spaces=\"true\">\uacb0\ub860\uc801\uc73c\ub85c<\/span><\/strong><\/h2>\n<p><span data-preserver-spaces=\"true\">\uc5f0\uad6c\uc790\ub4e4\uc774 \uc545\uc131 \ucf54\ub4dc\uc5d0 \uac10\uc5fc\ub41c \uac83\uc73c\ub85c \ubc1c\uacac\ud55c \uc571 \uc911 \uc77c\ubd80\uc5d0 \ubd88\uacfc\ud569\ub2c8\ub2e4. \ub530\ub77c\uc11c \uc774\ub7ec\ud55c \uc571\uc774 \ud734\ub300\ud3f0\uc5d0 \uc124\uce58\ub418\uc5b4 \uc788\ub2e4\uba74 \uc989\uc2dc \uc81c\uac70\ud558\uc138\uc694. \uadf8\ub9ac\uace0 \ud56d\uc0c1 Google Play Store\uc5d0\uc11c \ub2e4\uc6b4\ub85c\ub4dc\ud558\ub294 \uc571\uc5d0 \uc8fc\uc758\ud558\uc138\uc694. \uc774\ub7ec\ud55c \uac04\ub2e8\ud55c \ud301\uc744 \ub530\ub974\uba74 \uae30\uae30\ub97c \uc545\uc131 \uc18c\ud504\ud2b8\uc6e8\uc5b4\ub85c\ubd80\ud130 \ubcf4\ud638\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>\uad6c\uae00 \ud50c\ub808\uc774 \uc2a4\ud1a0\uc5b4\ub294 \uc548\ub4dc\ub85c\uc774\ub4dc \ud734\ub300\ud3f0\uc744 \uc704\ud55c \uc548\uc804\ud55c \uc7a5\uc18c\uac00 \uc544\ub2d9\ub2c8\ub2e4. \ucd5c\uadfc \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74 \ud574\ucee4\uac00 \uc2a4\ud1a0\uc5b4\uc5d0 \uc788\ub294 \ucd5c\uc18c 12\uac1c\uc758 \uc571\uc744 \uba40\uc6e8\uc5b4\uc5d0 \uac10\uc5fc\uc2dc\ud0a8 \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4. <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%ec%82%ac%ec%9d%b4%eb%b2%84-%ea%b3%b5%ea%b2%a9\/%ed%94%8c%eb%a0%88%ec%9d%b4-%ec%8a%a4%ed%86%a0%ec%96%b4%ec%97%90%ec%84%9c-%eb%b0%9c%ea%b2%ac%eb%90%9c-%ec%95%85%ec%84%b1%ec%bd%94%eb%93%9c-%ed%8f%ac%ed%95%a8-%ec%95%88%eb%93%9c%eb%a1%9c%ec%9d%b4\/\"><span class=\"screen-reader-text\">Play \uc2a4\ud1a0\uc5b4\uc5d0\uc11c \uba40\uc6e8\uc5b4\uac00 \ubc1c\uacac\ub41c \uc548\ub4dc\ub85c\uc774\ub4dc \uc571<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,14,21],"tags":[],"class_list":["post-311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","category-cyber-threats","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Android Apps with Malware Found on Play Store | Security Briefing<\/title>\n<meta name=\"description\" content=\"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ud50c\ub808\uc774-\uc2a4\ud1a0\uc5b4\uc5d0\uc11c-\ubc1c\uacac\ub41c-\uc545\uc131\ucf54\ub4dc-\ud3ec\ud568-\uc548\ub4dc\ub85c\uc774\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Android Apps with Malware Found on Play Store | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ud50c\ub808\uc774-\uc2a4\ud1a0\uc5b4\uc5d0\uc11c-\ubc1c\uacac\ub41c-\uc545\uc131\ucf54\ub4dc-\ud3ec\ud568-\uc548\ub4dc\ub85c\uc774\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-28T23:36:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Android Apps with Malware Found on Play Store\",\"datePublished\":\"2022-06-28T23:36:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"articleSection\":[\"Cyber Attacks\",\"Cyber Threats\",\"Malware\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\",\"name\":\"Android Apps with Malware Found on Play Store | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"datePublished\":\"2022-06-28T23:36:19+00:00\",\"description\":\"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Android-Apps-with-Malware-Found-on-Play-Store\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Android Apps with Malware Found on Play Store\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\ud50c\ub808\uc774 \uc2a4\ud1a0\uc5b4\uc5d0\uc11c \uc545\uc131\ucf54\ub4dc\uac00 \ubc1c\uacac\ub41c \uc548\ub4dc\ub85c\uc774\ub4dc \uc571 | \ubcf4\uc548 \ube0c\ub9ac\ud551","description":"\ucd5c\uadfc \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74 \uad6c\uae00 \ud50c\ub808\uc774 \uc2a4\ud1a0\uc5b4\uc5d0 \uc788\ub294 \ucd5c\uc18c 12\uac1c\uc758 \uc571\uc774 \uc545\uc131 \ucf54\ub4dc\uc5d0 \uac10\uc5fc\ub41c \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ud50c\ub808\uc774-\uc2a4\ud1a0\uc5b4\uc5d0\uc11c-\ubc1c\uacac\ub41c-\uc545\uc131\ucf54\ub4dc-\ud3ec\ud568-\uc548\ub4dc\ub85c\uc774\/","og_locale":"ko_KR","og_type":"article","og_title":"Android Apps with Malware Found on Play Store | Security Briefing","og_description":"A recent report has revealed that at least a dozen apps on the Google Play Store are infected with malware.","og_url":"https:\/\/securitybriefing.net\/ko\/\uc0ac\uc774\ubc84-\uacf5\uaca9\/\ud50c\ub808\uc774-\uc2a4\ud1a0\uc5b4\uc5d0\uc11c-\ubc1c\uacac\ub41c-\uc545\uc131\ucf54\ub4dc-\ud3ec\ud568-\uc548\ub4dc\ub85c\uc774\/","og_site_name":"Security Briefing","article_published_time":"2022-06-28T23:36:19+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"3\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Android Apps with Malware Found on Play Store","datePublished":"2022-06-28T23:36:19+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/"},"wordCount":598,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","articleSection":["Cyber Attacks","Cyber Threats","Malware"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/","name":"\ud50c\ub808\uc774 \uc2a4\ud1a0\uc5b4\uc5d0\uc11c \uc545\uc131\ucf54\ub4dc\uac00 \ubc1c\uacac\ub41c \uc548\ub4dc\ub85c\uc774\ub4dc \uc571 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","datePublished":"2022-06-28T23:36:19+00:00","description":"\ucd5c\uadfc \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74 \uad6c\uae00 \ud50c\ub808\uc774 \uc2a4\ud1a0\uc5b4\uc5d0 \uc788\ub294 \ucd5c\uc18c 12\uac1c\uc758 \uc571\uc774 \uc545\uc131 \ucf54\ub4dc\uc5d0 \uac10\uc5fc\ub41c \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/06\/Depositphotos_296409906_S-2.jpg","width":1000,"height":667,"caption":"Android-Apps-with-Malware-Found-on-Play-Store"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/android-apps-with-malware-found-on-play-store\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Android Apps with Malware Found on Play Store"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=311"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/311\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/312"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=311"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}