Android Installer Hijacking Scanner: Accept No Substitutes!

Ryan Olson


On March 24, we released the details of a vulnerability impacting millions of Android devices that allows an attacker to modify applications during the installation process. At that time we also released a scanner application that allowed users to determine whether their phone or tablet contained the vulnerability.

As with many newsworthy events, a few enterprising attackers have capitalized on this vulnerability and have released imposter scanner applications that infect the devices of unsuspecting users with malware. The activity does not appear to be widespread, but we remind our readers that the only legitimate places to retrieve the scanner are:

Other sources purporting to provide the same scanner application may not be trustworthy.

Got something to say?

Get updates: Unit 42

Sign up to receive the latest news, cyber threat intelligence and research from Unit42

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.


© 2018 Palo Alto Networks, Inc. All rights reserved.