Tuesday, April 1, 2025
HomeAndroidOver 400 Malicious Android & iOS Apps Stealing Facebook Passwords

Over 400 Malicious Android & iOS Apps Stealing Facebook Passwords

Published on

SIEM as a Service

Follow Us on Google News

In a recent press release from Meta Platforms, it was announced that over 400 malicious apps had been identified on both Android and iOS platforms. 

The goal of these apps was to steal login information for Facebook accounts from online users to leverage their fraudulent use of these apps. The most shocking thing is that the credentials of at least 1 million Facebook users may have been stolen by these malicious applications.

These malicious apps were listed and disguised as the following on both Apple’s App Store and Google Play Store:-

  • Photo editors
  • Games
  • VPN services
  • Business apps
  • Phone Utilities
  • Lifestyle

Malicious Apps

According to the report, among those malicious applications, there are 355 Android applications, and 47 iOS applications. It is necessary to set up an account with the Login with Facebook feature after the application has been launched, which prompts the user to create a profile.

It is possible for malware embedded in the application to steal the login credentials of a victim as soon as they enter their credentials.

In the event that a user uses the same credentials on another service, the attacker will be able to gain access to the user’s account and other accounts as well.

Both the Apple App Store and the Google Play Store have removed the apps in question from their respective stores. 

When downloading applications such as these, you should always exercise caution. Make sure you verify the access permissions before granting Facebook access to the promised functionality of the app.

Checking app permissions and reviews, as well as confirming the app developers’ legitimacy, is part of this process. Moreover, if you want the full list of 403 malicious apps then you can access them here.

Affected Individuals: What to Do?

Follow these mitigations if you believe that you have downloaded or logged in using one of these malicious applications:-

  • In the first place, you should delete the app from your device as soon as possible.
  • Create a new strong password and reset your old one.
  • If you use the same password for more than one website, be sure not to reuse it.
  • The most effective way to ensure the safety of your account is to enable two-factor authentication, preferably through an app called Authenticator. 
  • Set up a log-in alert so that when someone attempts to log into your account, you will be notified so that you can take action in time. 
  • To ensure you are aware of which devices have access to your account, be sure to review your previous sessions.

Also Read: Download Secure Web Filtering – Free E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

CISA Warns of Cisco Smart Licensing Utility Credential Flaw Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory warning organizations...

Hackers Deploy 24,000 IPs to Breach Palo Alto Networks GlobalProtect

A wave of malicious activity targeting Palo Alto Networks PAN-OS GlobalProtect portals has been...

Linux Lite 7.4 Final Released: Enhanced GUI and Bug Fixes

Linux Lite, a popular lightweight Linux distribution aimed at making Linux accessible to beginners,...

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Operation HollowQuill – Weaponized PDFs Deliver a Cobalt Strike Malware Into Gov & Military Networks

In a recent revelation by SEQRITE Labs, a highly sophisticated cyber-espionage campaign, dubbed Operation...

Earth Alux Hackers Use VARGIET Malware to Target Organizations

A new wave of cyberattacks orchestrated by the advanced persistent threat (APT) group Earth...

“Lazarus Hackers Group” No Longer Refer to a Single APT Group But a Collection of Many Sub-Groups

The term "Lazarus Group," once used to describe a singular Advanced Persistent Threat (APT)...