CamScanner has detected malware in its application of 100 million downloads



[ad_1]

Last April, CamScanner, the document scanner, offered the ability to display full-screen ads that can not be ignored.

This has created a kind of annoyance for the app users, but this time may be the end of trust and the end of his life on the Play Store.

CamScanner has detected malware in its application of 100 million downloads
CamScanner has detected malware in its application of 100 million downloads

Casper Sky researchers have found evidence of malware in several versions of the application on Android, including versions of the application between June and July of this year.

Although testing of the August versions of the application are free of malware, Google has decided to block the application from its store.

However, the researchers found the malicious component after warning of "suspicious behavior" in the free version of the CamScanner application.

Therefore, you should know that CamScanner was in fact a legitimate application without any malicious intent.

But at one point, the app uses annoying ads for monetization and even allows for in-app purchases.

This has changed because the security team has found that recent versions of the application came with ads containing a malicious module.

This module, called Trojan-Dropper.AndroidOS.Necro.n, is a Trojan horse, which means that a second malicious component can be extracted and executed in the application. In addition, this Trojan downloader can be loaded to infect devices with other types of malicious programs.

"The functions of Trojan-Dropper.AndroidOS.Necro.n mentioned above fulfill the main task of malware," said Casper Sky researchers.

Download a load of malicious servers and, therefore, module owners can use an infected device to their advantage in the way that they deem appropriate.

For example, you can display intrusive ads or even steal money from your users' account by charging paid subscriptions.

Update:

It seems that Google has decided to allow CamScanner to return to the Google Play Store, but by removing recent versions of this malicious program.

But here the question remains important!

Can application developers regain the trust they've lost when they provide malicious software in their application, whether intentional or not?


SOURCE:

Kaspersky

[ad_2]
Source link