• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Minecraft Clones Spread Dangerous Adware

You are here: Home / Security News / Minecraft Clones Spread Dangerous Adware

A group of 38 Google Play Minecraft knockoff apps infected devices with the Android adware “HiddenAds” to secretly load adverts, making money for the games’ creators.

Minecraft is a successful sandbox game with over 140 million active players monthly. About 35 million Android users around the world, mostly from the US, Canada, South Korea and Brazil downloaded Minecraft-like games that were hiding adware.

Minecraft adware is malicious software that disguises itself as a Minecraft-related program or mod, and displays unwanted advertisements or redirects users to potentially harmful websites. This type of adware is often spread through unofficial Minecraft mod websites, torrents, or download links from untrusted sources.

If you believe that your computer or device has been infected with Minecraft adware, you should take immediate action to remove it. Here are some steps that you can follow:

  • Uninstall any suspicious Minecraft mods or programs from your computer or device through the Control Panel or by using an anti-malware software.
  • Run a full scan of your computer using a reputable anti-malware software to detect and remove any remaining adware.
  • Clear your browser cache and cookies to remove any traces of the adware.
  • Ensure that you are downloading Minecraft mods and programs from reputable sources, such as the official Minecraft website or well-known mod repositories.
  • Install an ad blocker extension for your web browser to prevent unwanted ads from appearing.

By following these steps, you can help protect your computer or device from Minecraft adware and other types of malicious software.

It is essential to prioritise cybersecurity while playing games and using apps on your devices. Cybersecurity when using devices is crucial to protect personal information, prevent financial loss, protect reputation, safeguard devices, and comply with regulatory requirements. If you would like assistance or advice in regards to your workplace cybersecurity, please contact us.

Author: Lisa Seltzer, Agilient Consultant

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane