DODGY apps claiming to protect people’s phones from cybercrime have actually been caught doing the dirty themselves.

Experts have exposed six apps masquerading as do-gooding antivirus tools.

If you have any of these apps you should uninstall them now

2

If you have any of these apps you should uninstall them nowCredit: Check Point Research

But in reality, the software was spreading banking malware designed to help hackers steal passwords and get into accounts.

The dubious apps were downloaded more than 11,000 times, according to Check Point Research who uncovered the scam.

More than a third of victims are believed to be from the UK and the rest have been mostly traced back to Italy.

For the most part, they were found on Android.

Android and iPhone users warned Russian search engine could be taking data
Google warns users that thousands of apps will be 'hidden' over security risk

Google has since removed the bunch, but that doesn’t protect anyone who’s already downloaded them.

The six apps are:

  • Atom Clean-Booster, Antivirus
  • Antivirus, Super Cleaner
  • Alpha Antivirus, Cleaner
  • Powerful Cleaner, Antivirus
  • Center Security – Antivirus (available in two versions)

If you have them installed on your phone, you should remove the apps immediately and consider changing your passwords.

Most read in News Tech

Malware called Sharkbot was found lurking under the bonnet of the apps.

It’s a banking trojan known for luring victims into entering their login details in spoofed popups.

The precious data is then secretly sent off to hackers who can then access everything including emails, social media and banking accounts.

Hackers ‘speak Russian’

Experts assume the perpetrators speak Russian from their investigation.

Adding to suspicion, they noticed the apps were programmed not to work against anyone located in China, India, Romania, Russia, Ukraine or Belarus.

But, they said they don’t have enough evidence to point the finger at who exactly is behind it.

“Looking at the install count we can assume that the threat actor hit the bulls-eye for their method of malware spread,” said Alexander Chailytko, a cyber security at Check Point Software.

“The threat actor strategically chose a location of applications on Google Play that have users’ trust.

“What’s also noteworthy here is that the threat actors push messages to victims containing malicious links, which leads to widespread adoption.

Russia's 'chilling order to wipe out civilians in horrifying radio message'
Katie Price 'in hospital' as star sparks concern weeks after love split

“All in all, the use of push-messages by the threat actors requesting an answer from users is an unusual spreading technique.

“I think it’s important for all Android users to know that they should think twice before downloading any antivirus solution from the Play Store.”

Third of suspected victims live in the UK

2

Third of suspected victims live in the UKCredit: Getty

Best Phone and Gadget tips and hacks

Looking for tips and hacks for your phone? Want to find those secret features within social media apps? We have you covered…


We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at [email protected]


This post first appeared on Thesun.co.uk

You May Also Like

New iPhone SE deal from EE gets you a FREE pair of Airpods

EE has launched a range of tempting new pay monthly deals with…

Incredible Sky TV deal costs just 80p a day – and you don’t need a satellite dish

SKY TV is offering consumers a new 80p a day deal. The…

UK children’s digital privacy code comes into effect

Age Appropriate Design Code mandates apps to take ‘best interests’ of child…

Get Lost With a Signal-Blocking Smartphone Pouch

Albert Einstein kept a portrait of the 19th-century scientist Michael Faraday on…