Vulnerability in fully patched Android phones under active attack by bank thieves

A vulnerability in millions of fully patched Android phones is being actively exploited by malware that’s designed to drain the bank accounts of infected users, researchers said on Monday. The vulnerability allows malicious apps to masquerade as legitimate apps that targets have already installed and come to trust, researchers from security firm Promon reported in
Complete Reading

Enlarge / Indexy was removed from Google Play after Check Point researchers discovered it was being used in a campaign to spy on Egyptian citizens. Check Point Technologies Hackers with likely ties to Egypt’s government used Google’s official Play Store to distribute spyware in a campaign that targeted journalists, lawyers, and opposition politicians in that
Complete Reading

Enlarge / Malicious apps discovered by Symantec Threat Intelligence popped up full screen ads, and hid the app title even in the App Switcher view—making it difficult for users to know where they were coming from. Symantec This week, Symantec Threat Intelligence’s May Ying Tee and Martin Zhang revealed that they had reported a group
Complete Reading

The perils of Google Play are once again on display with the discovery of an app with 100 million downloads that contained a malicious component that downloaded secret payloads onto infected Android devices. Throughout most of its life, CamScanner was a legitimate app that provided useful functions for scanning and managing documents, researchers from antivirus
Complete Reading

Researchers found 85 Google Play apps with more than 8 million downloads that forced users to view fullscreen ads. The apps, which posed as photography and gaming programs, contained a family of adware that was highly disruptive to end users. Once installed, the apps displayed ads in full screen—a setting that forced users to view
Complete Reading

If the prevalence of abusive Google Play apps has left you numb, this latest report is for you: carefully concealed adware installed in Google-approved apps with more than 440 million installations was so aggressive it rendered mobile devices nearly unusable, researchers from mobile security provider Lookout said Tuesday. BeiTaAd, as the adware is known, is
Complete Reading

Package Name App Name # Installs com.heavy.excavator.simulator.driveandtransport Snow Heavy Excavator Simulator 10,000,000 com.hoverboard.racing.speed.simulator Hoverboard Racing 5,000,000 com.zg.real.tractor.farming.simulator.game Real Tractor Farming Simulator 5,000,000 com.ambulancerescue.driving.simulator Ambulance Rescue Driving 5,000,000 com.heavymountain.bus2018simulator Heavy Mountain Bus Simulator 2018 5,000,000 com.firetruckemergency.driver Fire Truck Emergency Driver 5,000,000 com.farming.tractor.realharvest.simulator Farming Tractor Real Harvest Simulator 5,000,000 com.carparking.challenge.parksimulator Car Parking Challenge 5,000,000 com.speedboat.jetski.racing.simulator Speed Boat
Complete Reading

Yu Chun Christopher Wong/S3studio/Getty Images Google Play has been caught hosting yet another malicious app, this time one that was designed to steal cryptocurrency from unwitting end users, researchers said Friday. The malware, which masqueraded as a legitimate cryptocurrency app, worked by replacing wallet addresses copied into the Android clipboard with one belonging to attackers,
Complete Reading

Enlarge / Screenshots of the pop-up ads displayed by malicious apps that were available in Google’s Play Store. Trend Micro Google has banned dozens of Android apps downloaded millions of times from the official Play Store after researchers discovered they were being used to display phishing and scam ads or perform other malicious acts. A
Complete Reading

Malicious apps hosted in the Google Play market are trying a clever trick to avoid detection—they monitor the motion-sensor input of an infected device before installing a powerful banking trojan to make sure it doesn’t load on emulators researchers use to detect attacks. The thinking behind the monitoring is that sensors in real end-user devices
Complete Reading

Create Account



Log In Your Account