Delete immediately from your Android device .. 24 applications contaminated by the malicious software "Joker"



[ad_1]

A day goes by and discovers many applications that have been downloaded hundreds of thousands of times on the Google Play app store, but contain in their code malicious software harmful to users.

This time, the malware, which has been detected in about 24 apps, is called Joker, according to Alexis Kobrins, a security researcher at CSIS.

The software is specifically designed to secretly register users for paid subscription services, which they may not notice to have done before following their monthly credit card statement.

Kobrins says "For example, in Denmark, the Joker can secretly record the victim at a service of DKK 50 per week (about € 6.71) .This strategy works by automating the necessary interaction with the webpage for an excellent subscription to the service, where the offer code is entered by the service provider, then wait for the SMS message with the confirmation code and extract that code with the help of regular expressions. the code extracted from the web page of the offer for the premium subscription license. "

Although Google removed these malicious apps from its PlayStore store, it managed to get more than 472,000 downloads before it was discovered.

If you have one of these apps installed on your Android phone or tablet – or worse, you're already using them – it's time to remove them as quickly as possible.

These applications are:

If you are using one of the above applications, it is advisable to check if your Google Play account is subscribed unexpectedly. You may not find anything here. Check your credit card statement or bank statement from June of this year, the following month. The Joker software has launched its latest subscription automation.

Live Hacker, a technical information site, also advises you to inform your contacts if a previous application is on your device because Joker can steal all your contacts and download them to the controller server.

[ad_2]
Source link