Beware of impostor Android apps posing as popular services like Google, Instagram, and WhatsApp. These apps, discovered by SonicWall Capture Labs, trick users into installing them, then gain control of devices unnoticed. Once installed, they can access sensitive information like contacts and messages, even sending phishing messages and stealing banking details. Recently, Symantec warned of a similar threat using WhatsApp to spread malware disguised as a harmless app. Stay vigilant, as cyber threats evolve rapidly. Always verify sources before downloading apps and be cautious of unexpected messages urging action. Cybersecurity remains a shared responsibility. #cybersecurity #vigilance #caution #banking
Olamide Daramola’s Post
More Relevant Posts
-
Malicious Android apps disguised as popular platforms like Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been found stealing user credentials. According to SonicWall Capture Labs, these apps deceive users into granting permissions to accessibility services and the device administrator API, enabling them to control the device and perform actions such as data theft and malware deployment. The malware communicates with a command-and-control server to access contacts, messages, and other data, and to open phishing pages mimicking login sites of well-known services. Stay informed and vigilant, especially now that digital scams and breaches are becoming increasingly sophisticated and prevalent. Make reading a habit and familiarize yourself with cybersecurity trends and tips! By staying proactive and educated about the latest cyber threats, you can better protect your digital assets from potential attacks. Want to stay updated? Subscribe to our newsletter by sending an email to marketing@secuna.io! Read here: https://lnkd.in/grAHCYbi
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
thehackernews.com
To view or add a comment, sign in
-
Smartphones are more vulnerable than we think. A Forbes article warns of rising threats like malware, phishing, and app exploits targeting mobile devices. As #cybersecurity becomes a business-wide concern, ensuring that mobile devices are secure is no longer optional. Simple steps—like updating settings, enabling #MFA, and being cautious with app downloads—can go a long way in protecting your personal and professional data. Read more here: https://lnkd.in/gdDux5MF #MobileSecurity #CyberResilience
Smartphone Security Warning—Make Changes Now Or Become A Victim
social-www.forbes.com
To view or add a comment, sign in
-
A new set of malicious Android apps has been detected, disguising themselves as legitimate applications but secretly harboring the notorious Joker malware. This malware engages in billing and SMS fraud by stealing text messages, contact lists, and device information. Despite Google's efforts to fortify its defenses, these apps cleverly bypass security measures on the Google Play Store by incorporating dormant malicious payloads, which activate only after the apps are downloaded by users. Among the affected are seemingly benign apps like messaging, health tracking, and PDF scanner apps. Key Takeaway: Always verify the legitimacy of apps, even when downloading from official stores. Read reviews, check developer credentials, and be cautious of the permissions you grant. #CyberSecurity #AndroidSafety #MalwareAlert #TechNews
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
thehackernews.com
To view or add a comment, sign in
-
Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. The distribution vector for the campaign is currently unclear. However, once the app is installed on the users' phones, it requests them to grant it permissions to the accessibility services and the device administrator API, a now-deprecated feature that provides device administration features at the system level. Obtaining these permissions allows the rogue app to gain control over the device, making it possible to carry out arbitrary actions ranging from data theft to malware deployment without the victims' knowledge. The malware is designed to establish connections with a command-and-control (C2) server to receive commands for execution, allowing it to access contact lists, SMS messages, call logs, the list of installed apps; send SMS messages; open phishing pages on the web browser, and toggle the camera flashlight. #MaliciousApps #AndroidSecurity #CyberThreats #PelionCyberSecurity #DataTheft #CredentialStealing #MobileSecurity
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
thehackernews.com
To view or add a comment, sign in
-
The latest #smartphone security warning highlights how small vulnerabilities can have massive consequences. A Forbes report reveals how even seemingly harmless apps can expose users to #malware, #phishing, or data breaches. Smartphones are not just personal devices—they're often gateways to sensitive business systems. Ensuring robust security settings and practicing good habits can protect both individuals and organizations. Read more about this critical warning and why immediate action is essential: https://lnkd.in/g73kH_Va #Cybersecurity #MobileSecurity #DataProtection
IT risk management expert. Founder and president of Securance Consulting and CISO at Dados Health. I help organizations improve cybersecurity, limit IT risk, and safeguard corporate, employee, and customer data.
Smartphones are more vulnerable than we think. A Forbes article warns of rising threats like malware, phishing, and app exploits targeting mobile devices. As #cybersecurity becomes a business-wide concern, ensuring that mobile devices are secure is no longer optional. Simple steps—like updating settings, enabling #MFA, and being cautious with app downloads—can go a long way in protecting your personal and professional data. Read more here: https://lnkd.in/gdDux5MF #MobileSecurity #CyberResilience
Smartphone Security Warning—Make Changes Now Or Become A Victim
social-www.forbes.com
To view or add a comment, sign in
-
📱 Beware of malicious Android apps posing as Google Update! With cyber threats targeting mobile devices on the rise, it's crucial to be cautious when downloading apps and to regularly update device software for enhanced security. Read more: Malicious Android Apps Pose as Google Update #CyberSecurity #AndroidSecurity #MobileThreats #GoogleUpdate
Malicious Android Apps Pose as Google, Instagram, WhatsApp, to Steal Credentials
thehackernews.com
To view or add a comment, sign in
-
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials Malicious Android apps masquerading as Google, Instagram, Snapchat, WhatsApp, and X (formerly Twitter) have been observed to steal users' credentials from compromised devices. "This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their devices," the SonicWall Capture Labs threat research team said in a recent report. https://lnkd.in/e9MRfaet Contact us now: info@simplysecuregroup.com #cybersecurity #simplysecure #simplysecuregroup #tech #cybersecurityteam #business
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
thehackernews.com
To view or add a comment, sign in
-
Beware of malicious apps that disguise themselves as popular apps to steal your credentials. These apps can be spread through smishing messages, which are text messages that contain malicious links. Once installed, these apps can access a variety of data on your device, including your banking information. Here are some tips to stay safe: #cybersecurity #androidsecurity #smishing https://lnkd.in/getpS673
Malicious Android Apps Pose as Google, Instagram, WhatsApp to Steal Credentials
thehackernews.com
To view or add a comment, sign in
-
👉🏽 Just like with a lot of other Android malware, the easiest way to avoid having your phone infected with the FakeCall banking trojan is to not sideload apps. While installing apps this way may be convenient, you’re putting yourself at additional risk since these apps don’t go through the same rigorous security checks that ones on official app stores like the Google Play Store, Samsung Galaxy Store and the Amazon App Store do. When in doubt, don’t install any apps as APK files on your phone. Instead, go to an official app store and search for the app you want to use by name. Google and other search engines are often used by hackers to host malicious ads, so it’s always better to navigate directly to an app store and search for new apps yourself. Likewise, you also want to limit the number of apps on your phone as even good apps can go bad. In order to stay protected from malware and other online threats, you want to ensure that Google Play Protect is enabled on your device. This built-in security app scans all of the new apps you download and the existing ones on your smartphone for malware. For additional protection though, you might also want to consider using one of the best Android antivirus apps alongside Google Play Protect. As long as there are apps, hackers are going to find a way to abuse them in their attacks. However, if you avoid sideloading new apps and don’t give the apps you do install access to permissions they don’t need, you should be safe from hackers. At the same time, it’s always a good idea to periodically restart your device to prevent hackers from using zero-click exploits to infect your phone with malware. #malware #android #smartphone #apps #google
This nasty Android trojan is hijacking calls to your bank and sending them to hackers — how to stay safe
tomsguide.com
To view or add a comment, sign in
-
Over 200 malicious Android apps were discovered on Google Play between June 2023 and April 2024, resulting in over 8 million downloads. The most common threat, Joker malware, enables premium-rate service fraud, while adware and credential-stealing malware also pose risks. As app store security falters, liability concerns rise: should users, banks, or services bear the responsibility for compromised systems? With mobile malware and AI-driven phishing becoming more sophisticated, adopting zero-trust architectures is essential to proactively close security gaps and prevent future breaches. #cybersecurity #zeroTrust #dataprotection
Eight Million Users Download 200+ Malicious Apps from Google Play
infosecurity-magazine.com
To view or add a comment, sign in