Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability cyber security news
  • Aave Below Its Long Term Support; What To Expect Now? bitcoin news
  • Avalanche Crumbles More Than 16% As Crypto Landslide Continues bitcoin news
  • Why Sell In May Might Not Work This Time For Bitcoin bitcoin news
  • L1 Ethereum Network Fees Drop to Levels Not Seen in Over 2 Months, L2 Fees Follow – Altcoins Bitcoin News bitcoin news
  • Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks cyber security news
  • Global Metaverse Event of Lydian․World in Dubai Opera 7th May 2022 bitcoin news
  • US Senator Introduces Bill Prohibiting Labor Department From Interfering With Crypto in Retirement Accounts – Regulation Bitcoin News bitcoin news

Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store

Posted on May 9, 2022 By root


A new set of trojanized apps spread via the Google Play Store has been observed distributing the notorious Joker malware on compromised Android devices.

Joker, a repeat offender, refers to a class of harmful apps that are used for billing and SMS fraud, while also performing a number of actions of a malicious hacker’s choice, such as stealing text messages, contact lists, and device information.

Despite continued attempts on the part of Google to scale up its defenses, the apps have been continually iterated to search for gaps and slip into the app store undetected.

“They’re usually spread on Google Play, where scammers download legitimate apps from the store, add malicious code to them and re-upload them to the store under a different name,” Kaspersky researcher Igor Golovin said in a report published last week.

The trojanized apps, taking the place of their removed counterparts, often appear as messaging, health tracking, and PDF scanner apps that, once installed, request permissions to access text messages and notifications, abusing them to subscribe users to premium services.

A sneaky trick used by Joker to bypass the Google Play vetting process is to render its malicious payload “dormant” and only activate its functions after the apps have gone live on the Play Store.

Three of the Joker-infected apps detected by Kaspersky through the end of February 2022 are listed below. Although they have been purged from Google Play, they continue to be available from third-party app providers.

  • Style Message (com.stylelacat.messagearound),
  • Blood Pressure App (blood.maodig.raise.bloodrate.monitorapp.plus.tracker.tool.health), and
  • Camera PDF Scanner (com.jiao.hdcam.docscanner)

This is not the first time subscription trojans have been uncovered on app marketplaces. Last year, apps for the APKPure app Store and a widely-used WhatsApp mod were found compromised with malware called Triada.

Then in September 2021, Zimperium took the wraps off an aggressive money-making scheme called GriftHorse, following it up with yet another case of premium service abuse called Dark Herring earlier this January.

“Subscription trojans can bypass bot detection on websites for paid services, and sometimes they subscribe users to scammers’ own non-existent services,” Golovin said.

“To avoid unwanted subscriptions, avoid installing apps from unofficial sources, which is the most frequent source of malware.”

Even when downloading apps from official app stores, users are advised to read the reviews, check the legitimacy of the developers, the terms of use, and only grant permissions that are essential to perform the intended functions.





TheHackersNews/

cyber security news

Post navigation

Previous Post: ‘African Fintechs Have a Greater Scale Potential Than Other Tech Startups’ – Interview Bitcoin News
Next Post: Metaverse Project GensoKishi Online Announces a Closed Alpha Ticket (Bronze) Lottery – Press release Bitcoin News

Related Posts

  • Google’s New Safety Section Shows What Data Android Apps Collect About Users cyber security news
  • CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability cyber security news
  • Malware Analysis: Trickbot cyber security news
  • New Saitama backdoor Targeted Official from Jordan’s Foreign Ministry cyber security news
  • U.S. Offers $10 Million Bounty for Information on 6 Russian Military Hackers cyber security news
  • New Hacker Group Pursuing Corporate Employees Focused on Mergers and Acquisitions cyber security news

Archives

  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • How Ethereum Uniswap Reached A Milestone Of $1T In Trading Volume
  • Russian Court Recognizes Cryptocurrency as Means of Payment, Prosecutors See Precedent – Regulation Bitcoin News
  • Bitcoin, Ethereum Exchange Inflows Suggest Sell-Offs Are Far From Over
  • SOL, NEAR Fall Over 10% During Tuesday’s Session – Market Updates Bitcoin News
  • Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

Recent Comments

No comments to show.
  • Tron Is Trading Within Its Triangle Pattern; What Awaits The Coin Next? bitcoin news
  • FTX US Launches Zero-Commission Equities Trading Platform – Bitcoin News bitcoin news
  • Blue Chip NFTs 101 – What Is The Proof Collective And Who’s Behind It? bitcoin news
  • What To Stake in 2022: Zilliqa Blockchain in figures bitcoin news
  • The Nightly Mint: Daily NFT Recap bitcoin news
  • Bitcoin Taker Buy-Sell Ratio Rebounds Back Into “Hold” Zone bitcoin news
  • Bitcoin Gains Momentum, Why Break Above $30K Is Crucial bitcoin news
  • QNAP Advises to Mitigate Remote Hacking Flaws Until Patches are Available cyber security news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme