Beware of these malware apps on Google Play Store! Delete from your phone now

A month ago, cybersecurity researchers uncovered some extremely dangerous adware and data-stealing malware apps on the Google Play Store. And shockingly, at least five of them are still available on the Play Store. It has now been reported that these apps have managed to garner over two million downloads. What’s more worrying is that the spyware apps can steal data from the other apps’ too, reveals Bleeping Computer. In fact, a Dr. Web antivirus report has revealed that the adware apps and data-stealing Trojans were among the biggest threats to Android phones in May 2022. Know all details about these treacherous Android malware apps and what you must do about it.

How does this Android malware work?

This adware malware on Google Play Store can bring unwanted advertisements on your Android smartphones which can generally be intrusive, deplete the battery, can generate more heat, spoil user experience, and can even cause unauthorized financial transactions. The worst part is that this Android malware software tries to hide by masquerading as something else that can host devices and makes money for remote operators by forcing the user to tap on the affiliated advertisements.

The data-stealing malware is also very dangerous as it can steal the login credentials for websites that you frequently login to, including social media and online banking accounts!

Do you have these Android malware apps on your phone?

The report mentions the threats to your Android devices. Among many, here are the 5 known Android malware apps on the Google Play Store that are still available:

  • PIP Pic Camera Photo Editor: This has managed to surpass more than 1 million downloads. The malware hides in the image-editing software that steals the Facebook account login details.
  • Wild & Exotic Animal Wallpaper: It is a masquerading adware malware that transforms its icon and name to ‘SIM Tool Kit’ and adds itself to the battery-saving exceptions list. It crossed more than 500,000 downloads.
  • Zodi Horoscope – Fortune Finder: This is another malware that steals Facebook account credentials. This also has more than 500,000 downloads.
  • PIP Camera 2022: Facebook account hijacker malware that has 50,000 downloads. It is a camera effects app.
  • Magnifier Flashlight: It is an adware app that offers videos and static banner ads. It got 10,000 downloads.

The Bleeping Computer report asks users to beware of these apps and other such applications which pose risk to your data and privacy. Users who installed these apps on their Android device should remove them immediately as well as run a full AV scan to uproot any leftovers of the malware.

Hot this week

When AI Studies Together Security Questions Follow

ChatGPT's Study Together feature highlights security considerations for collaborative learning, with actionable steps to protect information during group AI interactions.

The Hidden Cybersecurity Risks of Working Multiple Tech Jobs

Exploring how juggling multiple tech jobs creates hidden security vulnerabilities and practical steps to maintain protection without burnout.

Kubernetes Isnt a Magic Fix for Tech Problems

Kubernetes often masks deeper tech issues like security gaps, especially when adopted hastily. Focus on fundamentals and training for real resilience.

Exposed Secrets in GitHub Commits

Accidental leaks of secrets in GitHub commits are more common than you think. Learn practical steps to prevent credentials exposure in your repositories.

Human Expertise Remains Essential in the Age of AI

AI transforms cybersecurity work but cannot replace human judgment. Practical steps help professionals adapt and thrive by combining technical tools with irreplaceable skills.

Topics

When AI Studies Together Security Questions Follow

ChatGPT's Study Together feature highlights security considerations for collaborative learning, with actionable steps to protect information during group AI interactions.

The Hidden Cybersecurity Risks of Working Multiple Tech Jobs

Exploring how juggling multiple tech jobs creates hidden security vulnerabilities and practical steps to maintain protection without burnout.

Kubernetes Isnt a Magic Fix for Tech Problems

Kubernetes often masks deeper tech issues like security gaps, especially when adopted hastily. Focus on fundamentals and training for real resilience.

Exposed Secrets in GitHub Commits

Accidental leaks of secrets in GitHub commits are more common than you think. Learn practical steps to prevent credentials exposure in your repositories.

Human Expertise Remains Essential in the Age of AI

AI transforms cybersecurity work but cannot replace human judgment. Practical steps help professionals adapt and thrive by combining technical tools with irreplaceable skills.

Why Securing IP Addresses Matters More Now

Let's Encrypt now issues free certificates for IP addresses, enabling stronger security for devices and services without domain names worldwide.

LibreOffice Offers Free Guides to Simplify Transition from Microsoft Office

LibreOffice provides free migration guides to help users leave Microsoft Office, highlighting open source benefits for security and cost savings globally.

A Fairer Way to Pay for Web Crawling

Cloudflare's new pay-per-crawl model offers cost transparency for web scraping needs while protecting site owners from excessive traffic.
spot_img

Related Articles

Popular Categories

spot_imgspot_img