Wednesday, April 23, 2025
HomeCyber Security NewsMalicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

Malicious Apps On Amazon Appstore Records Screen And Interecpt OTP Verifications

Published on

SIEM as a Service

Follow Us on Google News

A seemingly benign health app, “BMI CalculationVsn,” was found on the Amazon App Store, which secretly collected sensitive user data, including installed app package names and incoming SMS messages, posing a significant privacy threat.

The BMI calculator app conceals malicious intent, as the app’s primary function is a smokescreen for a variety of harmful activities, likely involving data theft, unauthorized access, or other cyberattacks

Application published on Amazon Appstore
Application published on Amazon Appstore

It secretly initiates screen recording upon user interaction, potentially capturing sensitive information like passwords.

- Advertisement - Google News

While the current implementation doesn’t upload recordings, the malicious potential remains, indicating a work-in-progress threat.

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

By scanning the device to compile a list of all applications that have been installed, the application can either identify users who are the targets of complex attacks or prepare for such attacks.

It intercepts all incoming SMS messages on the device, potentially capturing sensitive information like one-time passwords (OTPs) and verification codes. The stolen data is then uploaded to a Firebase storage bucket named “testmlwr-d4dd7.appspot.com.”

Upload User Data
Upload User Data

The “com.zeeee.recordingappz” malware, initially a screen recorder, evolved into an SMS-stealing app in October 2024, as its current state suggests ongoing development and testing phases.

Based on the presence of the “testmlwr” character in the Firebase Installation API address, it can be deduced that the application is still undergoing testing.

Cybercriminals exploited the reputation of a legitimate Indonesian IT service provider to distribute malware disguised as a legitimate app on the Amazon Appstore, suggesting potential ties between the attackers and Indonesia.

The Timeline of Application Development
The Timeline of Application Development

To protect devices from malicious apps, users should install trusted antivirus software, carefully review app permission requests, and monitor their devices for unusual behavior like performance degradation, battery drain, or excessive data usage.

According to McAfee, even benign apps like “BMI CalculationVsn” can pose security risks. To protect digital privacy, users must remain vigilant and employ strong security measures to mitigate potential cyber threats.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...