[ad_1]
Generally, these apps masquerade as battery managers, phone cleaners, device speed boosters, and even horoscope-themed apps. These apps carry out their malicious acts by impersonating legitimate banks and displaying replica login screens in order to steal your sign-in details.
Additionally, there are some programs – discovered by security experts at ESET that pretend to delete themselves or display fake error messages during the launch but continue to breach your privacy from the background.
Related: Microsoft Office, Internet Browsers and Android Apps are the Easiest Targets of Cyber Attacks
One such app named “Easy Rates Converter” was available on the Play Store for almost a week and was downloaded in around 500 devices before being discovered.
How do spam apps function?
According to cybersecurity experts, more than 29 Trojans are hard to detect. Most of these are linked with a particular category – the Red Alert 2.
These Trojans use customized phishing attacks and are capable of working remotely. However, they are so harmful that they can target any other app present on the device and intercept all messages as well as calls made via the compromised device.
Even though these banking Trojans are installed in your device through apps that run under different names – they share a similar code and server. This suggests that perhaps a single hacker or group is responsible for these acts.
List of apps that contain the Banking Trojan
According to cybersecurity experts, the below list of apps contain the banking Trojan and should be immediately uninstalled/removed from your device.
Read Next: Digital Data Breaches Realm – 20+ Fascinating Cyber Security Facts (infographic)
Featured image: Engadget
Source link