Saturday, March 8, 2025
HomeMalwareAndroid Mobile Antivirus App Collecting User Data Without Device Owner's Permission

Android Mobile Antivirus App Collecting User Data Without Device Owner’s Permission

Published on

SIEM as a Service

Follow Us on Google News

To keep our personal data safe we use Antivirus, but what results if the Antivirus solution can’t be trusted. Security experts form Check Point discovered a Mobile antivirus DU Antivirus Security collecting user information without their permission.

According to google play store data, this app downloaded between 10 and 50 million times and have a good review from users.

Checkpoint researchers said the app collects information from the device including call logs, Contacts, unique identifiers and even the location of the device. Then this information is encrypted and transferred to a remote server maintained by DU.
Antivirus
Image: Checkpoint

Apps that Present in Play store with harmful codes 

So what are they doing with the collected information?, they do have another one app(Caller ID & Call Block – DU Caller) which provides caller details and to block calls.All the collected data are utilized with this app.

Also Read Mobile spyware that steals Twitter credentials uses sandbox to Evade detection

The purpose of an Antivirus is to protect the user data but DU Antivirus acts vice versa. Checkpoint security experts reported the app to google and it was taken down by 24, 2017.Along with DU Antivirus, they found other 30 apps with similar behavior and 12 of them from play store.

Mobile antivirus shows legitimate reasons to request additional permissions, such apps should be avoided, By having it is an advantage fraudster will abuse resources. Users are strongly advised to use security solutions from the reputed provider.

com.power.core.setting
com.friendivity.biohazard.mobo
com.energyprotector.tool
com.power.core.message
batterysaver.cleaner.speedbooster.taskkiller.phonecooler
com.rammanager.pro
com.memoryanalysis.speedbooster
com.whosthat.callerid
speedbooster.memorycleaner.phonecleaner.phonecooler
com.example.demos
com.android.fb
antivirus.mobilesecurity.antivirusfree.antivirusandroid
speedtest.networksecurity.internetbooster
com.ramreleaser.speedbooster
com.dianxinos.optimizer.duplay
com.coolkeeper.instacooler
com.memoryreleaser.booster
com.freepopularhotvideo.hotube

           Apps that Present outside of Play store with harmful codes 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Fake BianLian Ransom Demands Sent via Physical Letters to U.S. Firms

In a novel and concerning development, multiple U.S. organizations have reported receiving suspicious physical...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

New PyPI Malware Targets Developers to Steal Ethereum Wallets

A recent discovery by the Socket Research Team has unveiled a malicious PyPI package...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lumma Stealer Using Fake Google Meet & Windows Update Sites to Launch “Click Fix” Style Attack

Cybersecurity researchers continue to track sophisticated "Click Fix" style distribution campaigns that deliver the...

Strela Stealer Malware Attack Microsoft Outlook Users for Credential Theft

The cybersecurity landscape has recently been impacted by the emergence of the Strela Stealer...

New PyPI Malware Targets Developers to Steal Ethereum Wallets

A recent discovery by the Socket Research Team has unveiled a malicious PyPI package...