Tech News

These 17 applications are stealing bank data, it’s time to eliminate them

17 Google Play applications were infected by banking Trojan.

Cybercriminals introduced malicious code in 17 applications of Play Storethe store of Googlea fact that puts users on alert.

These infected applications could be installed and, in turn, integrate a system called ‘daw dropper’, which consists of the remote download of malicious code of banking Trojans on users’ devices. These viruses were aimed steal information related to the bank accounts of the victims.

According to a report by Trend Micro Incorporated, a security company that alerted this situation, at the end of 2021a malicious campaign was found that claimed to use the DawDropper to bypass Play Store security and infect various apps from Android.

Platforms identified and to be removed are Just In: Video Motion, Document Scanner Pro, Conquer Darkness, Simpli Cleaner, Unicc QR Scanner, Call Recorder, Call Recorder pro +, Rooster VPN, Super Cleaner, Universal Saver Pro, Eagle photo edit , Extra Cleaner, Crypto Utils, Fix Cleaner, Lucky Cleaner,

The procedure was done through a third-party cloud service to circumvent the detection and get a payload download address.

Google Play applications were infected with banking Trojans that sought to steal information from users.  (Trend Micro)
Google Play applications were infected with banking Trojans that sought to steal information from users. (Trend Micro)

The information revealed by the report, titled “Examining the new DawDropper Banking Dropper and DaaS in the Dark Web”, allowed to identify the set of compromised applications and are currently no longer available in the Play Store of Google.

Although the intention of the banking dropper method is to distribute and install viruses on the devices of its victims, there are many ways to achieve its goal.

According to the security firm’s observation, DawDropper has variants that produce four types of banking Trojans: Octo, Hydra, Ermac, and TeaBot. These use a database owned by Google, so they avoid being detected.

DawDropper has variants that produce four types of banking Trojans: Octo, Hydra, Ermac, and TeaBot.  They were intended to be used to steal money from users.  (Five days)
DawDropper has variants that produce four types of banking Trojans: Octo, Hydra, Ermac, and TeaBot. They were intended to be used to steal money from users. (Five days)

As additional programming, the virus had the ability to disable the Google Play Protectwhich is responsible for scanning the applications of a device and verifying that they do not contain malicious data, in addition to collecting user data, such as the identification of Android of infected smartphones, contact list, installed applications and even text messages.

How to avoid being a victim of cybercriminals

Cybercriminals are constantly finding ways to evade detection and infect as many devices as possible. Over the last half year, we have seen how banking Trojans have evolved to avoid detection, and hide malicious payloads in droplets.

As there are more banking trojans available, malicious actors will have an easier way to distribute malware disguised as Applications legitimate.

It is not yet known if the data fell into the hands of cybercriminals, but the vulnerability exposed millions of data.
It is not yet known if the data fell into the hands of cybercriminals, but the vulnerability exposed millions of data.

As this trend will continue and more banking Trojans will be distributed in the future, it is necessary for users to take into account these recommendations and security practices in order to fall victim to criminals.

In addition to those already mentioned, users can use other solutions that allow scanning the mobile devices in real time and, if it detects other malicious or malware-laden applications, block or remove them from the store.

:

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button