Thursday, February 27, 2025
HomeMalwareAndroid Mobile Antivirus App Collecting User Data Without Device Owner's Permission

Android Mobile Antivirus App Collecting User Data Without Device Owner’s Permission

Published on

SIEM as a Service

Follow Us on Google News

To keep our personal data safe we use Antivirus, but what results if the Antivirus solution can’t be trusted. Security experts form Check Point discovered a Mobile antivirus DU Antivirus Security collecting user information without their permission.

According to google play store data, this app downloaded between 10 and 50 million times and have a good review from users.

Checkpoint researchers said the app collects information from the device including call logs, Contacts, unique identifiers and even the location of the device. Then this information is encrypted and transferred to a remote server maintained by DU.
Antivirus
Image: Checkpoint

Apps that Present in Play store with harmful codes 

So what are they doing with the collected information?, they do have another one app(Caller ID & Call Block – DU Caller) which provides caller details and to block calls.All the collected data are utilized with this app.

Also Read Mobile spyware that steals Twitter credentials uses sandbox to Evade detection

The purpose of an Antivirus is to protect the user data but DU Antivirus acts vice versa. Checkpoint security experts reported the app to google and it was taken down by 24, 2017.Along with DU Antivirus, they found other 30 apps with similar behavior and 12 of them from play store.

Mobile antivirus shows legitimate reasons to request additional permissions, such apps should be avoided, By having it is an advantage fraudster will abuse resources. Users are strongly advised to use security solutions from the reputed provider.

com.power.core.setting
com.friendivity.biohazard.mobo
com.energyprotector.tool
com.power.core.message
batterysaver.cleaner.speedbooster.taskkiller.phonecooler
com.rammanager.pro
com.memoryanalysis.speedbooster
com.whosthat.callerid
speedbooster.memorycleaner.phonecleaner.phonecooler
com.example.demos
com.android.fb
antivirus.mobilesecurity.antivirusfree.antivirusandroid
speedtest.networksecurity.internetbooster
com.ramreleaser.speedbooster
com.dianxinos.optimizer.duplay
com.coolkeeper.instacooler
com.memoryreleaser.booster
com.freepopularhotvideo.hotube

           Apps that Present outside of Play store with harmful codes 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency...

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has...

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government,...

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign...