banner



These dangerous Android apps can hijack your phone — what to do now

These dangerous Android apps tin hijack your phone — what to do at present

Green skull on smartphone screen.
(Image credit: Shutterstock)

Google has booted eight malicious Android apps from the Play Store that were designed to steal money from online financial accounts and take over smartphones, according to a new report from Israeli security firm Check Betoken.

The apps, listed below, snuck into Google Play through the front end door. They didn't seem malicious when Google's malicious-app screening procedure evaluated them, Check Point said, considering the apps' creators fabricated sure the apps communicated merely with Google's own Firebase cloud back-end servers, which are ofttimes used by smartphone apps.

  • Report: Two-thirds of Android malware comes through Google Play
  • The best Android antivirus apps to keep your phone make clean
  • Plus: Google Pixels can now read your heart charge per unit and breathing

But once the apps were installed past users, Check Point said, they switched to communicating with GitHub, a lawmaking-sharing platform owned by Microsoft upon which anyone tin mail software and other items.

Each app contained a hidden "dropper" designed to install more software, and those droppers downloaded the AlienBot banking Trojan from individual GitHub pages dedicated to each app. (Independent researchers at MalwareHunterTeam also posted about this on Twitter in late Jan.)

Check Point described AlienBot every bit "second-phase malware that targets financial applications by bypassing ii-factor authentication codes for fiscal services."

In other words, AlienBot — once installed — steals your online banking countersign and gets effectually the 2-factor hallmark (2FA) methods meant to protect against the apply of stolen passwords.

Even worse, said Cheque Point, AlienBot frequently installs the Android version of TeamViewer, a legitimate app that enables remote control of a smartphone (or a figurer) from afar.

With TeamViewer installed, the bogus apps' creator(s) could have logged into victims' banking company accounts at whatever time.

"The hacker was able to leverage readily available resources to featherbed Google Play Shop's protections," said Check Point researcher Aviran Hazum. "The victims thought they were downloading an innocuous utility app from the official Android market, but what they were really getting was a unsafe Trojan coming straight for their fiscal accounts."

Cheque Point said information technology notified Google about these malicious apps on Jan. 28, and Google confirmed on Feb. 9 that all had been removed from Google Play.

How to remove malicious apps from your phone

Many people may still have these apps installed on their devices. Here'south a nautical chart showing the name of each app along with their unique Android application IDs, which are important because Android apps often share identical or very similar names.

App name Application ID
BeatPlayer com.crrl.beatplayers
Cake VPN com.lazycoder.cakevpns
eVPN com.abcd.evpnfree
Music Player com.revosleap.samplemusicplayers
Pacific VPN com.protectvpn.freeapp
QR/Barcode Scanner MAX com.bezrukd.qrcodebarcode
QRecorder com.record.callvoicerecorder
tooltipnatorlibrary com.mistergrizzlys.docscanpro

To make certain you lot don't have any of these apps installed, scroll through your apps and run into if anything has a proper noun similar to i of those to a higher place.

If then, then go to Settings > Apps & notifications. Yous may have to tap an extra push to see all your apps at once.

Scroll downwardly to the suspicious app and tap it. On the app's screen, tap Advanced, so tap App Details.

You should exist taken direct to the app's folio in the Google Play app, which is really just a specialized web browser. Tap the three stacked dots in the upper correct of the Google Play app page, then tap Share.

A flyout window should appear at the bottom of the screen displaying the web address, or URL, for the app's Google Play store page.

The concluding part of that URL, later the equal sign, is the app'southward awarding ID.

For example, when you await upwardly the Facebook Android app in Google Play, the URL is "https://play.google.com/store/apps/details?id=com.facebook.katana." The application ID for the Facebook app is "com.facebook.katana".

If one of your apps has an application ID that matches one of the application IDs the chart above, then you'll accept to remove information technology.

Tap the back push button to go out of the flyout window on the app'due south Google Play page. Then tap Uninstall to get rid of the app.

Paul Wagenseil is a senior editor at Tom's Guide focused on security and privacy. He has too been a dishwasher, fry melt, long-haul driver, code monkey and video editor. He's been rooting around in the data-security space for more 15 years at FoxNews.com, SecurityNewsDaily, TechNewsDaily and Tom'south Guide, has presented talks at the ShmooCon, DerbyCon and BSides Las Vegas hacker conferences, shown upwardly in random Tv news spots and even chastened a console discussion at the CEDIA dwelling-technology conference. Y'all tin follow his rants on Twitter at @snd_wagenseil.

Source: https://www.tomsguide.com/news/malicious-android-apps-alienbot

Posted by: gonzalezarager.blogspot.com

0 Response to "These dangerous Android apps can hijack your phone — what to do now"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel