Friday, June 14, 2024

Several Malicious Apps on Google Play Posing as Voice Messenger Steal User Personal Information

Malicious apps on Google play posing as a legitimate voice messenger pop-ups fake survey forms in user’s devices and generate fraudulent ad clicks.

Security researchers from TrendMicro observed a number of malicious apps and they have deployed one by one since October and the cybercriminals continue to add more features to those apps.

Once such voice messenger app that contains common behaviors analyzed by researchers, all the identified apps having the same codes, behavior and they are from the same developer.

Malicious Apps Steal User Information

Once these malicious apps downloaded to the user’s device, then it establishes a connection with the C&C server then decrypts and execute the payload.

The payload executes two modules, Icon which hides icon and reduces the chance for the user in removing the app and the next one Wpp that open’s browser to access arbitrary URLs and generates fraudulent ad clicks.

The app displays the fake popups and gathers user’s personal information such as names, phone numbers, and home addresses, in exchange for gift cards.

The app use to open the face survey form in default browser, if default browser not preferred then the app will open survey form in any one of the browsers that include Boat Browser, Brave, Chrome, Cheetah, Dolphin, DU, Firefox, Jiubang Digital Portal, Link Bubble, Opera, Opera Mini, Puffin, and UC.

We have not observed communication with the server, we believe that this feature is still in development, researchers said.

All the identified apps have been reported to Google by Trend Micro and the malicious apps are removed now.

Recently a massive ad fraud scheme uncovered that tracked users when they are downloaded new apps and use their to claim the credit, this process called as click flooding and click injection.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.


Latest articles

Sleepy Pickle Exploit Let Attackers Exploit ML Models And Attack End-Users

Hackers are targeting, attacking, and exploiting ML models. They want to hack into these...

SolarWinds Serv-U Vulnerability Let Attackers Access sensitive files

SolarWinds released a security advisory for addressing a Directory Traversal vulnerability which allows a...

Smishing Triad Hackers Attacking Online Banking, E-Commerce AND Payment Systems Customers

Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes.Resecurity...

Threat Actor Claiming Leak Of 5 Million Ecuador’s Citizen Database

A threat actor has claimed responsibility for leaking the personal data of 5 million...

Ascension Hack Caused By an Employee Who Downloaded a Malicious File

Ascension, a leading healthcare provider, has made significant strides in its investigation and recovery...

AWS Announced Malware Detection Tool For S3 Buckets

Amazon Web Services (AWS) has announced the general availability of Amazon GuardDuty Malware Protection...

Hackers Exploiting MS Office Editor Vulnerability to Deploy Keylogger

Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group.The...
Guru baran
Guru baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles