The Android world has been frequently targeted with malware attacks, as a result of apps installed on smartphones. These often come from unauthorized sources, but they also come from the Play Store itself.
A new group of hacked apps are attacking this Google system, and there are a total of 16 apps with this behavior. It’s time to remove these nefarious proposals that put users’ smartphones at risk.
This is a recent discovery that puts many Android devices at risk. Their origin is well known and they have been found on the Play Store, disguised as apps with various features, but mostly unnecessary for users.
Through this door they gained access to many components of the fixtures and thus were able to spread very quickly and effectively. what was openThere have been more than 20 million downloads and related installations. List of applications below.
- High Speed Camera - Over 10 Million Downloads
- Smart Task Manager - Over 5 Million Downloads
- Flashlight + - Over 1 Million Downloads
- Memo Calendar - Over 1 Million Downloads
- K-Dictionary - Over 1 Million Downloads
- BusanBus - Over 1 Million Downloads
- Flashlight + - Over 500 thousand downloads
- Quick Note - Over 500K Downloads
- Currency Converter - Over 500K Downloads
- Joycode - Over 100,000 downloads
- EzDica - Over 100K Downloads
- Instagram Profile Downloader - Over 100K Downloads
- Ez Notes - Over 100,000 Downloads
- Flash Lite - 1K + . Downloads
- Calc - Over 100 Downloads
- Flashlight + - 100+ downloads
As far as is known, this is not malware intended to steal user data. It is a "click" type, which means that it constantly performs remote requests and clicks on pages and ads that reach the attacker.
Websites visited are received remotely and completely silently. Browsing and clicking actions also occur in the background, where the user has no visibility or control over these actions performed by the malware.
In these cases, the biggest problem with this malware is not the information it has access to, but rather the resources it consumes. By carrying out its actions, it generates a lot of network traffic and the data associated with it. There are still other points that are consumed in these operations.
Again, as in all cases of malware and other threats, these apps should be removed from the smartphone immediately. You also have to be very careful with the apps you choose and avoid those that promise too much.
“Friendly zombie fanatic. Analyst. Coffee buff. Professional music specialist. Communicator.”