Cybersecurity researchers recently found 2 malicious applications on the Google Play store, installed by 1.5M users, collecting excessive data beyond what is required for promised features.
The two malicious apps, both by the same publisher, are designed to exfiltrate data that is sensitive in nature and transmit it to the various malicious servers that are established in China autonomously.
The behavioral analysis engine of Pradeo identified these two malicious spyware applications. While their description on the Data Safety section of Google Play claims that there is “No data collection from users’ devices.”
Here below, we have mentioned the two malicious applications along with their Google Play store download counts:-
Here below, we have mentioned the types of data that are exfiltrated by these two apps are:-
While the most shocking thing is that each of the applications excessively transmits the data collected, surpassing the normal state with more than a hundred transmissions.
Though some data collection may be justified for performance and compatibility, but the apps collect some unnecessary data beyond the scope of file management or data recovery needs.
Here the most strange thing is that the unnecessary data collected by the spyware apps is collected without the permission of the user, as they are collected secretly.
To make the removal difficult, the apps hide their icons from the home screen of the affected device, and they also exploit the approved permissions to operate discreetly in the background and reboot the device.
Here below we have mentioned all the behaviors that are sneaky in nature and used by the threat actor to increase its success rate:-
Here below we have mentioned all the recommendations:-
“AI-based email security measures Protect your business From Email Threats!” – .
SilkSpecter, a Chinese financially motivated threat actor, launched a sophisticated phishing campaign targeting e-commerce shoppers…
The research revealed how threat actors exploit SEO poisoning to redirect unsuspecting users to malicious…
Black Basta, a prominent ransomware group, has rapidly gained notoriety since its emergence in 2022…
CVE-2024-52301 is a critical vulnerability identified in Laravel, a widely used PHP framework for building…
A critical vulnerability has been discovered in the popular "Really Simple Security" WordPress plugin, formerly…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert and added two…