Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • Hauser’s Marks 45 Years With Province-Wide Customer Celebration and Renewed Focus on Community Care
    • Young drivers face elevated collision risks after consuming edible cannabis, new CAA-funded study finds
    • Salvation Army Thrift Store Marks 40th Ontario Location with Peterborough Opening
    • Early Blast of Winter Prompts Safety Warnings from Ontario Road Authorities
    • HONOR Takes Home Two TIME Best Inventions 2025 Awards for Smartphone Breakthroughs
    • Toronto Set to Host Largest LEGO® Fan Event in Canadian History
    • Hank Azaria and Caitlin Morrison Champion Mental Health Through Music at Toronto’s Koerner Hall
    • Bricks in the Six to Build Canada’s Largest-Ever LEGO® Fan Event This November
    Facebook X (Twitter) Instagram YouTube
    Vaughan TodayVaughan Today
    • Home
    • Top News
    • World
    • Banking
    • Explore Canada
    • How to
    • Solutions
    • Contact Form
    Vaughan TodayVaughan Today
    Home»Tech»Massively downloaded apps have stolen thousands of bank credentials
    Tech

    Massively downloaded apps have stolen thousands of bank credentials

    Jillian CastilloBy Jillian CastilloDecember 12, 2021No Comments2 Mins Read
    Massively downloaded apps have stolen thousands of bank credentials
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Computer viruses and hackers keep renewing themselves in an attempt to catch their victim. Stronger restrictions and protections force hackers to find new ways. ThreatFabric researchers have revealed a list of malicious apps uploaded to Google Play Store More than 300,000 times before viruses become active.

    The apps came in the form of QR code scanners, PDF scanners, or even wallets Cryptomoney. Cybercriminals have used several methods to bypass Google restrictions in order to infect users undetected.

    Gain user trust

    Initially, the apps did not have a viral payload. It allows users to get used to using it. ThreatFabric researchers explain that “What makes Play Store malware campaigns so difficult to detect is that all apps have a very low malicious footprint.”

    Once they get used to the software, users will receive a message asking them to download updates from an external source to the Google Play Store. “This incredible focus on avoiding unwanted attention makes automated malware detection less reliable,” says ThreatFabric.

    The researchers discovered four families of malware in these apps: Alien, Hydra, Ermac, and Anatsa. The most common family was the Anatsa malware. One banking trojan An advanced Android system with many capabilities, such as remote access to systems and the ability to automatically transfer funds from victims’ accounts to victims’ accounts.
    pirates.

    Chosen victims

    In order to make their software as undetectable as possible, the people responsible for distributing this malware took time to post a large number of positive reviews and install the software on a large number of phones. In addition, the applications contain the functionality that they claim to have. So the victim is not aware of anything.

    Finally, hackers did not send fake updates to all users. “The actors tried to target only the areas of interest to them,” the researchers explained. “If all conditions are met, the payload will be downloaded and installed.”

    As the researchers explained, it is difficult to distinguish these malicious apps from legitimate apps. To avoid unpleasant surprises, it is better not to install an application with a small number of users. Finally, it is not particularly recommended to install apps or updates from external sources for the Play Store.

    Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email
    Jillian Castillo

    "Proud thinker. Tv fanatic. Communicator. Evil student. Food junkie. Passionate coffee geek. Award-winning alcohol advocate."

    Related Posts

    MSI Unveils Black Friday Discounts on Flagship Laptops and Handhelds

    November 1, 2025

    Rare Earth Metals: Essential Uses and the Global Supply Chain

    October 4, 2025

    Bell error 2000: Troubleshoot and Solutions

    June 4, 2023
    Facebook X (Twitter) Instagram Pinterest
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.