'Agent Smith' Android malware infected 25M devices

The malware disguised itself as the Google Updater and modified apps such as WhatsApp, Opera Mini, and Flipkart.
 By  Adam Smith  for PCMag  on 
'Agent Smith' Android malware infected 25M devices
Credit: Jaap Arriens/NurPhoto via Getty Images

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.

A new strain of Android malware has infected 25 million devices and modified legitimate apps with a malicious ads module, according to a report by the security company Check Point.

It's believed the malware originated from a Chinese internet company that helps Chinese Android developers publish and promote their apps in foreign markets. The malware was disguised as Google-related updaters and "vending modules," which hid its own app icons and automatically replaced already-installed legitimate apps with its own version without the user knowing. This lead the researchers to name the malware "Agent Smith" because its behavior is similar to the character in the film The Matrix of the same name.

The malware first appeared in popular third-party app store 9Apps and targeted mostly Indian, Pakistani and Bangladeshi users. However, of the 25 million affected devices, 303,000 infections were detected in the US, and 137,000 in the UK.

Apps that were modified include WhatsApp, Opera Mini, Flipkart, as well as software from Lenovo and Swiftkey. The malware detected which apps were installed, patched them with a malicious ads modules, and then re-installed them on the device. For the user, it simply looks like the app is being updated as expected. Once the update is complete, the owner of the malware can then profit from the newly included ads.

Check Point believes the same malware could also be used for more malicious purposes such as credit card theft, with the company's report stating, "due to [the malware's] ability to hide its icon from the launcher and impersonates any popular existing apps on a device, there are endless possibilities for this sort of malware to harm a user's device."

The security firm says they submitted data to Google and law enforcement agencies, and as of publishing no malicious apps remain on the Play Store. Nevertheless, the malware managed to survive for as long as it did because, despite the original vulnerability Agent Smith was based on being patched in Android years ago, developers did not sufficiently update their applications.

Malware like this, "requires attention and action from system developers, device manufacturers, app developers, and users, so that vulnerability fixes are patched, distributed, adopted and installed in time," Check Point says.

Mashable Potato

Recommended For You
Do you have one of these 17 browser extensions? They could be tracking your browsing history.
safari and chrome apps on phone

FBI investigates Steam games with hidden malware
Steam logo on laptop

Clean up the internet for your whole household for just $15.97
Girl using laptop

Popular Chrome extension disabled for containing malware
Google Chrome logo

Everything you need to know about the malware stealing data from Mac users
MacBook in the dark using Terminal

Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone

NYT Connections hints today: Clues, answers for April 4, 2026
Connections game on a smartphone

Google launches Gemma 4, a new open-source model: How to try it
Google Gemma

Wordle today: Answer, hints for April 4, 2026
Wordle game on a smartphone
The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!