December 14, 2024 19:39 (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Pushpa 2 stampede: Allu Arjun walks out of jail, actor's lawyer slams delay in release | Donald Trump intends to end 'inconvenient' and 'very costly' Daylight Saving Time | Suchir Balaji: Indian-origin former OpenAI researcher found dead at US apartment | Bengaluru techie suicide: Karnataka Police issues summons to wife Nikita, her family members | French President Macron appoints centrist leader Francois Bayrou as new Prime Minister | Congress always prioritised personal interest over Constitution: Rajnath Singh | Jaishankar calls attack on Hindus in Bangladesh 'a source of concern' | Allu Arjun arrested over woman's death in stampede during Pushpa 2 premiere show | RBI receives bomb threat in Russian language, case filed | UP teenager kills mother, lives with body for 5 days
Spyware
Image: Wallpaper Flare

Android users face security risk after malware found in over 100 apps in Google Play: Report

| @indiablooms | Jun 05, 2023, at 02:18 am

Cybersecurity never ceases to be a cause of worry as makers of spyware, malware, and other harmful modules keep inventing new ways to breach the safety net of our gadgets and steal users’ confidential information.

Recently, malware analysts have flagged an Android mini-game app that is actually spyware. It collects user information stored in mobile phones and transfers it to cybercriminals, antivirus company Dr Web reported.

According to experts, this malefic software has cast a dark cloud hanging over user safety as the spyware was embedded in 101 apps that had more than 420 million downloads.

Named Android.Spy.SpinOk, it is distributed as a marketing software development kit (SDK) and developers can embed it in all sorts of games and apps, including those available on the Google Play Store.

"On the surface, the SpinOk module is designed to maintain users’ interest in apps with the help of mini-games, a system of tasks, and alleged prizes and reward drawings," the report said. "Upon initialisation, this trojan SDK connects to a C&C server by sending a request containing a large amount of technical information about the infected device."

The spyware implements measures to modify its operational patterns in order to evade detection by security researchers, said the report.

"For the same purpose, it ignores device proxy settings, which allows it to hide network connections during analysis. In response, the module receives a list of URLs from the server, which it then opens in WebView to display advertising banners," the report said.

Through this functionality, the spyware allows cyber criminals to access the list of files on the targeted device, check for specific files or directories, and even manipulate the contents of the device's clipboard. Doctor Web experts discovered this spyware module, along with various modified versions of it, in several applications available on Google Play.

"Our malware analysts discovered it in 101 apps with at least 421,290,300 cumulative downloads. Thus, hundreds of millions of Android device owners are at risk of becoming victims of cyber espionage. Doctor Web notified Google about the uncovered threat," the company stated.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.