CYBERSECURITY – Many seemingly innocuous apps have stolen users’ banking information after being inactive for a long time
Computer viruses and hackers keep renewing themselves in an attempt to catch their victim. Increasingly strong restrictions and protections are forcing hackers to find new ways. ThreatFabric researchers have come up with a list of malicious apps that were downloaded from the Google Play Store more than 300,000 times before the viruses were activated.
The apps came in the form of QR code scanners, PDF scanners, or even cryptocurrency wallets. Cybercriminals have used various methods to bypass Google’s restrictions in order to infect users undetected.
Earn user trust
At first, the apps had no viral load. They allow users to get used to their use. “What makes these Play Store malware campaigns very difficult to detect is that all applications have a very low malicious footprint,” explain ThreatFabric researchers.
Once they got used to the software, users would receive a message asking them to download updates from a source outside of the Google Play Store. “C (…) Read more in 20 minutes
How bots help hackers steal your bank details
Thousands of French passports for sale on the Dark Web
Be careful, these 8 applications are infected by the dreaded Joker malware
Rank Math Seo Pro Weadown, Wordfence Premium Nulled, Yoast Nulled, PHP Script, Fs Poster Plugin Nulled, Astra Pro Nulled,Woodmart Theme Nulled, Wpml Nulled, Avada 7.4 Nulled, Woodmart Theme Nulled, PW WooCommerce Gift Cards Pro Nulled, Elementor Pro Weadown, Newspaper – News & WooCommerce WordPress Theme, Nulledfire, Slider Revolution Nulled, Elementor Pro Weadown, Jnews 8.1.0 Nulled, WeaPlay, Business Consulting Nulled, WP Reset Pro, Newspaper 11.2, Flatsome Nulled, Woocommerce Custom Product Ad, Premium Addons for Elementor, Jannah Nulled, Consulting 6.1.4 Nulled, Plugins, WordPress Theme, Dokan Pro Nulled