Cybersecurity researchers recently found 2 malicious applications on the Google Play store, installed by 1.5M users, collecting excessive data beyond what is required for promised features.
The two malicious apps, both by the same publisher, are designed to exfiltrate data that is sensitive in nature and transmit it to the various malicious servers that are established in China autonomously.
The behavioral analysis engine of Pradeo identified these two malicious spyware applications. While their description on the Data Safety section of Google Play claims that there is “No data collection from users’ devices.”
Here below, we have mentioned the two malicious applications along with their Google Play store download counts:-
Here below, we have mentioned the types of data that are exfiltrated by these two apps are:-
While the most shocking thing is that each of the applications excessively transmits the data collected, surpassing the normal state with more than a hundred transmissions.
Though some data collection may be justified for performance and compatibility, but the apps collect some unnecessary data beyond the scope of file management or data recovery needs.
Here the most strange thing is that the unnecessary data collected by the spyware apps is collected without the permission of the user, as they are collected secretly.
To make the removal difficult, the apps hide their icons from the home screen of the affected device, and they also exploit the approved permissions to operate discreetly in the background and reboot the device.
Here below we have mentioned all the behaviors that are sneaky in nature and used by the threat actor to increase its success rate:-
Here below we have mentioned all the recommendations:-
“AI-based email security measures Protect your business From Email Threats!” – .
Best DNS Management Tools play a crucial role in efficiently managing domain names and their…
Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS environments…
Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling them…
SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases from…
In late October 2024, a coordinated IP spoofing attack targeted the Tor network, prompting abuse…
The Metasploit Framework, a widely used open-source penetration testing tool maintained by Rapid7, has introduced…