Sunday, March 23, 2025
HomeMalwareAndroid Mobile Antivirus App Collecting User Data Without Device Owner's Permission

Android Mobile Antivirus App Collecting User Data Without Device Owner’s Permission

Published on

SIEM as a Service

Follow Us on Google News

To keep our personal data safe we use Antivirus, but what results if the Antivirus solution can’t be trusted. Security experts form Check Point discovered a Mobile antivirus DU Antivirus Security collecting user information without their permission.

According to google play store data, this app downloaded between 10 and 50 million times and have a good review from users.

Checkpoint researchers said the app collects information from the device including call logs, Contacts, unique identifiers and even the location of the device. Then this information is encrypted and transferred to a remote server maintained by DU.
Antivirus
Image: Checkpoint

Apps that Present in Play store with harmful codes 

So what are they doing with the collected information?, they do have another one app(Caller ID & Call Block – DU Caller) which provides caller details and to block calls.All the collected data are utilized with this app.

Also Read Mobile spyware that steals Twitter credentials uses sandbox to Evade detection

The purpose of an Antivirus is to protect the user data but DU Antivirus acts vice versa. Checkpoint security experts reported the app to google and it was taken down by 24, 2017.Along with DU Antivirus, they found other 30 apps with similar behavior and 12 of them from play store.

Mobile antivirus shows legitimate reasons to request additional permissions, such apps should be avoided, By having it is an advantage fraudster will abuse resources. Users are strongly advised to use security solutions from the reputed provider.

com.power.core.setting
com.friendivity.biohazard.mobo
com.energyprotector.tool
com.power.core.message
batterysaver.cleaner.speedbooster.taskkiller.phonecooler
com.rammanager.pro
com.memoryanalysis.speedbooster
com.whosthat.callerid
speedbooster.memorycleaner.phonecleaner.phonecooler
com.example.demos
com.android.fb
antivirus.mobilesecurity.antivirusfree.antivirusandroid
speedtest.networksecurity.internetbooster
com.ramreleaser.speedbooster
com.dianxinos.optimizer.duplay
com.coolkeeper.instacooler
com.memoryreleaser.booster
com.freepopularhotvideo.hotube

           Apps that Present outside of Play store with harmful codes 

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

Researchers Uncover FIN7’s Stealthy Python-Based Anubis Backdoor

Researchers have recently discovered a sophisticated Python-based backdoor, known as the Anubis Backdoor, deployed...

Researchers Reveal macOS Vulnerability Exposing System Passwords

A recent article by Noah Gregory has highlighted a significant vulnerability in macOS, identified...

JumpServer Flaws Allow Attackers to Bypass Authentication and Gain Full Control

JumpServer, a widely used open-source Privileged Access Management (PAM) tool developed by Fit2Cloud, has...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Attackers Leverage Weaponized CAPTCHAs to Execute PowerShell and Deploy Malware

In a recent surge of sophisticated cyberattacks, threat actors have been utilizing fake CAPTCHA...

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

Massive “DollyWay” Malware Attack Compromises 20,000+ WordPress Sites Worldwide

A significant malware operation, dubbed "DollyWay," has been uncovered by GoDaddy Security researchers, revealing...