Sunday, December 3, 2023

Android Mobile Antivirus App Collecting User Data Without Device Owner’s Permission

To keep our personal data safe we use Antivirus, but what results if the Antivirus solution can’t be trusted. Security experts form Check Point discovered a Mobile antivirus DU Antivirus Security collecting user information without their permission.

According to google play store data, this app downloaded between 10 and 50 million times and have a good review from users.

Checkpoint researchers said the app collects information from the device including call logs, Contacts, unique identifiers and even the location of the device. Then this information is encrypted and transferred to a remote server maintained by DU.
Antivirus
Image: Checkpoint

Apps that Present in Play store with harmful codes 

So what are they doing with the collected information?, they do have another one app(Caller ID & Call Block – DU Caller) which provides caller details and to block calls.All the collected data are utilized with this app.

Also Read Mobile spyware that steals Twitter credentials uses sandbox to Evade detection

The purpose of an Antivirus is to protect the user data but DU Antivirus acts vice versa. Checkpoint security experts reported the app to google and it was taken down by 24, 2017.Along with DU Antivirus, they found other 30 apps with similar behavior and 12 of them from play store.

Mobile antivirus shows legitimate reasons to request additional permissions, such apps should be avoided, By having it is an advantage fraudster will abuse resources. Users are strongly advised to use security solutions from the reputed provider.

com.power.core.setting
com.friendivity.biohazard.mobo
com.energyprotector.tool
com.power.core.message
batterysaver.cleaner.speedbooster.taskkiller.phonecooler
com.rammanager.pro
com.memoryanalysis.speedbooster
com.whosthat.callerid
speedbooster.memorycleaner.phonecleaner.phonecooler
com.example.demos
com.android.fb
antivirus.mobilesecurity.antivirusfree.antivirusandroid
speedtest.networksecurity.internetbooster
com.ramreleaser.speedbooster
com.dianxinos.optimizer.duplay
com.coolkeeper.instacooler
com.memoryreleaser.booster
com.freepopularhotvideo.hotube

           Apps that Present outside of Play store with harmful codes 

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles