DODGY apps claiming to protect people’s phones from cybercrime have actually been caught doing the dirty themselves.

Experts have exposed six apps masquerading as do-gooding antivirus tools.

If you have any of these apps you should uninstall them now

2

If you have any of these apps you should uninstall them nowCredit: Check Point Research

But in reality, the software was spreading banking malware designed to help hackers steal passwords and get into accounts.

The dubious apps were downloaded more than 11,000 times, according to Check Point Research who uncovered the scam.

More than a third of victims are believed to be from the UK and the rest have been mostly traced back to Italy.

For the most part, they were found on Android.

Android and iPhone users warned Russian search engine could be taking data
Google warns users that thousands of apps will be 'hidden' over security risk

Google has since removed the bunch, but that doesn’t protect anyone who’s already downloaded them.

The six apps are:

  • Atom Clean-Booster, Antivirus
  • Antivirus, Super Cleaner
  • Alpha Antivirus, Cleaner
  • Powerful Cleaner, Antivirus
  • Center Security – Antivirus (available in two versions)

If you have them installed on your phone, you should remove the apps immediately and consider changing your passwords.

Most read in News Tech

Malware called Sharkbot was found lurking under the bonnet of the apps.

It’s a banking trojan known for luring victims into entering their login details in spoofed popups.

The precious data is then secretly sent off to hackers who can then access everything including emails, social media and banking accounts.

Hackers ‘speak Russian’

Experts assume the perpetrators speak Russian from their investigation.

Adding to suspicion, they noticed the apps were programmed not to work against anyone located in China, India, Romania, Russia, Ukraine or Belarus.

But, they said they don’t have enough evidence to point the finger at who exactly is behind it.

“Looking at the install count we can assume that the threat actor hit the bulls-eye for their method of malware spread,” said Alexander Chailytko, a cyber security at Check Point Software.

“The threat actor strategically chose a location of applications on Google Play that have users’ trust.

“What’s also noteworthy here is that the threat actors push messages to victims containing malicious links, which leads to widespread adoption.

Russia's 'chilling order to wipe out civilians in horrifying radio message'
Katie Price 'in hospital' as star sparks concern weeks after love split

“All in all, the use of push-messages by the threat actors requesting an answer from users is an unusual spreading technique.

“I think it’s important for all Android users to know that they should think twice before downloading any antivirus solution from the Play Store.”

Third of suspected victims live in the UK

2

Third of suspected victims live in the UKCredit: Getty

Best Phone and Gadget tips and hacks

Looking for tips and hacks for your phone? Want to find those secret features within social media apps? We have you covered…


We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at [email protected]


This post first appeared on Thesun.co.uk

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Nature: Female bonobos ‘adopt’ orphans from other social groups in a surprising display of altruism

In an astonishing display of altruism, female bonobo apes will ‘adopt’ and…

Cash App Is King at Square

Jack Dorsey’s Square Inc. became a tech darling on the back of…

Do Not Put Your Kid on an Electric Bike

In my review of the RadRunner, I noted that it was massive.…

Hackers Are Exploiting Discord Links to Serve Up Malware

Thanks in large part to the global pandemic, collaboration platforms like Discord…