Typically, users who want to find and install android apps of the highest quality are recommended to rely on Google Play Store as one of the most trusted sources.
In order to prevent fraud in the official Play Store, Google has removed dozens of fraudulent apps. Through the virtual marketplace, these fraudulent apps have been spotted spreading the following malware families like:-
In the latest study conducted by Zscaler ThreatLabz and Pradeo, it was shown that the same pattern is emerging. This malware is still making its way into Google’s official app store, despite the fact that the malware’s traces are regularly modified to avoid detection.
Although the official app store has been updated to remove some malware, the malware is still present. Joker is a fleeceware that makes the users to subscribe to unwanted paid services, and gathers the following data:-
Two cybersecurity firms have identified a total of 53 Joker downloader apps, which have been downloaded over 330,000 times cumulatively by the two security firms.
Typically, these apps pretend to be something that they are not, like:-
Here below we have listed all the malicious applications:-
There is a wide range of malware programs that are developed by the Joker malware authors ranging from extremely complex to the most basic of applications.
The remote nature of these malicious apps is, to a large extent, one of the reasons why they are often unnoticed by antivirus softwares and the Play Store when they are evaluated.
It has also been discovered that Facebook users have been targeted by a type of malware known as Facestealer, found on the Google Play Store.
When a user successfully logs in, the malware author steals both the username and password along with the authentication tokens.
Besides the usual rules of thumb when it comes to downloading apps from app stores. Apart from this, users are recommended to follow these mitigations:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.
A fundamental security issue in the design of the IEEE 802.11 WiFi protocol standard, according…
The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside…
The National Crime Agency (NCA) of the United Kingdom revealed that it had built several fake…
Recently, Twitter has acknowledged that some of its confidential source code has been exposed on…
After the finale of Pwn2Own Vancouver 2023, the Masters of Pwn, Synacktiv (@Synacktiv), received $1,035,000…
In response to a recent vulnerability identified in Outlook, Microsoft recently published a proper guide…