Cybersecurity researchers recently found 2 malicious applications on the Google Play store, installed by 1.5M users, collecting excessive data beyond what is required for promised features.
The two malicious apps, both by the same publisher, are designed to exfiltrate data that is sensitive in nature and transmit it to the various malicious servers that are established in China autonomously.
The behavioral analysis engine of Pradeo identified these two malicious spyware applications. While their description on the Data Safety section of Google Play claims that there is “No data collection from users’ devices.”
Here below, we have mentioned the two malicious applications along with their Google Play store download counts:-
Here below, we have mentioned the types of data that are exfiltrated by these two apps are:-
While the most shocking thing is that each of the applications excessively transmits the data collected, surpassing the normal state with more than a hundred transmissions.
Though some data collection may be justified for performance and compatibility, but the apps collect some unnecessary data beyond the scope of file management or data recovery needs.
Here the most strange thing is that the unnecessary data collected by the spyware apps is collected without the permission of the user, as they are collected secretly.
To make the removal difficult, the apps hide their icons from the home screen of the affected device, and they also exploit the approved permissions to operate discreetly in the background and reboot the device.
Here below we have mentioned all the behaviors that are sneaky in nature and used by the threat actor to increase its success rate:-
Here below we have mentioned all the recommendations:-
“AI-based email security measures Protect your business From Email Threats!” – .
Researchers have discovered a critical flaw in Active Directory’s NTLMv1 mitigation strategy, where misconfigured on-premises…
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions…
Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing…
A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI…
A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables…
Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address…