8 “Dangerous” Android Apps That Make Money & Messages Should Be Removed Immediately



[ad_1]

Cyber ​​security researchers discovered eight scam apps that stole users’ texts and money, and stressed the need to remove them immediately.

With a total of 700,000 installations, the malware was deployed in the form of wallpapers, keyboard covers, photo editors, and other camera-related applications.

Read more

Reports: update

Cyber ​​security giant McAfee said in a blog on Monday that the apps were listed on the Google Play Store in the Arabian Peninsula and Southwest Asia.

Fortunately, Google removed it from the store after receiving reports from McAfee.

“A new wave of fraudulent apps has made its way into the Google Play Store. The malware included in these scam apps hijack SMS notifications and then make unauthorized purchases, ”said researchers Sang Ryul Ryu and Shanan Pak.

Applications go through a review process before they are allowed to access the Google Play Store, but scammers have found an easy way to overcome this problem.

To bypass “google guards”, apps were initially touted as “clean” apps before malicious code was added through a series of updates.

The attackers then make purchases with the victim’s credit card, making the purchase very important.

Read more

Warnings

McAfee calls it Android / Etinu malware. Although they have been removed from the Google Play Store, the apps may still be on your phone.

And if any of the following are lurking in your app library, be sure to delete them:

– com.studio.keypaper2021

– com.pip.editor.camera

– org.my.f Favorites.up.keypaper

– com.super.color.hairdryer

– com.ce1ab3.app.photo.editor

– com.hit.camera.pip

– com.daynight.keyboard.wallpaper

– com.super.star.ringtones

The American company advised users of the “Google Play” store to monitor the permissions requested by applications when they are downloaded.

“It’s important to pay attention to apps that request SMS listening and notification permissions,” the researchers wrote.

Source: the sun



[ad_2]
Source link