Last week, Microsoft launched the first version of Windows Subsystem for Android (WSA), whose purpose is to enable Windows users to launch Android apps alongside Windows apps. Unfortunately, the first version is limited to the Amazon Appstore and only a small number of early apps. Wanting more, an Italian UX design student using the nickname ADeltaX on the internet has figured out a way to install the Google Play Store on Windows 11, and he created a video guide and step-by-step instructions on his GitHub to make it easy for others to follow in his footsteps.
The whole process takes roughly half an hour from start to finish, and it involves the following steps:
- Download the Windows Subsystem for Android.
- Install the Windows Subsystem for Linux (yes, Linux).
- Install the unzip and lzip software packages.
- Download up-to-date Google Apps.
- Extract the Windows Subsystem for Android.
- Download, configure, and run the provided installation scripts to create a modified version of the Windows Subsystem for Android.
- Install the Windows Subsystem for Android using PowerShell.
From there, you can sign in to the Google Play Store and download any app or game. Just don’t expect everything to run smoothly because there’s a good reason why Microsoft is keeping the first version of WSA limited to a handful of hand-picked apps.
If all this sounds like too much for something that might not even work properly, then you should know that there’s also a pretty straightforward way to install Android apps outside of the Amazon Appstore, and it revolves around a free tool called WSATools, which you can download from the Microsoft Store.
Just keep in mind that apps that depend on the Google Play Store won’t work using this method. Let us know if this guide helped you install Google Play Store on Windows 11.
New Variants Of Android Spyware Are Targeting Middle East Users
Sophos recommends Android users to never install apps from untrusted sources and avoid ignoring available OS and app updates.
British security software and hardware company Sophos has recently revealed that new variants of Android spyware used by the C-23 group are actively targeting users in the Middle East.
C-23, also known as GnatSpy, FrozenCell, or VAMP, is what cybersecurity professionals refer to as an advanced persistent threat (APT) adversary. Such adversaries are typically well-funded and well-organized, which allows them to quickly evolve their tactics to overcome even the most sophisticated cybersecurity defenses.
The C-23 adversary has been known for targeting individuals in the Middle East since at least 2017, with a particular focus on the Palestinian territories.
The latest variants of its Android spyware are most likely distributed via a download link sent to victims as text messages. The link leads to a malicious app that pretends to install legitimate updates on the victim’s mobile device. When the app is launched for the first time, it requests a number of permissions that let it spy on the victim. It then disguises itself to make removal more difficult.
“The new variants use more, and more varied, disguises than previous versions, hiding behind popular app icons such as Chrome, Google, Google Play, YouTube, or the BOTIM voice-over-IP service” explain Sophos. “If targets click a fraudulent icon, the spyware launches the legitimate version of the app, while maintaining surveillance in the background”.
The information the new spyware can steal includes everything from text messages to the names of installed apps to contacts from all kinds of apps, including Facebook and WhatsApp. The spyware can even dismiss notifications and toggle “Do Not Disturb” settings.
Sophos recommends Android users to never install apps from untrusted sources and avoid ignoring available OS and app updates. The company’s own mobile antivirus app, called Sophos Intercept X for Mobile, can detect the new spyware as well as all kinds of other malicious software.