Wednesday, December 25, 2024
HomeAndroidCritical Vulnerabilities in Free Android Antivirus Apps Let Attackers to Steal Address...

Critical Vulnerabilities in Free Android Antivirus Apps Let Attackers to Steal Address Books and Disable Antivirus Protection

Published on

SIEM as a Service

Serious security flaws found in free Android antivirus apps expose user’s address book and also let the attackers disable antivirus protection completely. Even a lot of the app’s failed to detect the test virus.

Based on the analysis from Comparitech of 21 free Android antiviruses, three apps contains serious security flaws, seven apps failed to detect the virus. “In total, 47% of the vendors we tested failed in some way.”

Security Vulnerabilities in Android antivirusVIPRE, BullGuard and AEGISLAB are three antivirus app that poses serious risks to user privacy.

- Advertisement - SIEM as a Service

VIPRE and BullGuard affected with Insecure Direct Object References, AEGISLAB and BullGuard with XSS.

IDOR

  • VIPRE – If address book sync enabled attackers can steal the contacts.
  • VIPRE – Attacker can send fake alerts.
  • BullGuard – Let hackers disable antivirus.

XSS

  • BullGuard – Vulnerable script let attackers insert malicious codes.
  • AEGISLAB – Vulnerable script let attackers insert malicious codes.

All the vulnerabilities have been reported by Comparitech to the vendors and the vulnerabilities have been patched.

Free Android Antivirus apps Failed to Detect Virus

Following are the apps that failed to detect the test virus

  • AEGISLAB Antivirus Free
  • Antiy AVL Pro Antivirus & Security
  • Brainiacs Antivirus System
  • Fotoable Super Cleaner
  • MalwareFox Anti-Malware
  • NQ Mobile Security & Antivirus Free
  • Tap Technology Antivirus Mobile
  • Zemana Antivirus & Security

User privacy is a key concern, vendors keen to grab users personal activities and habits to push targeted ads, according to the report, “dfndr security was far and away from the worst offender. It puts users search and browser habits up for sale on every ad exchange there is.”

Choosing the Best Antivirus for Android is the most important concern to protect your Andriod device from sophisticated cyber threats. Here we detailed a list of top 10 best antivirus for android that offers maximum protection.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

A seemingly benign health app, "BMI CalculationVsn," was found on the Amazon App Store,...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Node.js systeminformation Package Vulnerability Exposes Millions of Systems to RCE Attacks

A critical command injection vulnerability in the popular systeminformation npm package has recently been disclosed, exposing...

Skuld Malware Using Weaponized Windows Utilities Packages To Deliver Malware

Researchers discovered a malware campaign targeting the npm ecosystem, distributing the Skuld info stealer...

BellaCiao, A new .NET Malware With Advanced Sophisticated Techniques

An investigation revealed an intrusion in Asia involving the BellaCiao .NET malware, as the...