Home Technology Google Removes Malware Apps That Stole Banking Logins On Android

Google Removes Malware Apps That Stole Banking Logins On Android

When you purchase through our sponsored links, we may earn a commission. By using this website you agree to our T&Cs.

Google –Alphabet Inc Class A (NASDAQ:GOOGL)– has removed a group of apparently inoffensive apps, which in truth were malware used to steal Android users’ banking logins. According to experts who discovered the scam, the apps were downloaded more than 300,000 times.

Get Our Activist Investing Case Study!

Get The Full Activist Investing Study In PDF

Q3 2021 hedge fund letters, conferences and more

Trojan Horse

As reported by CNET, “Mobile security researchers at mobile security company ThreatFabric found malware designed to steal people's online banking passwords and two-factor authentication codes.” The experts said the malware was able to log keystrokes and also took screenshots of users’ phones.

The bogus apps utilized several fraud methods, and researchers established that many of them could evade Google's new security limits by first presenting users with an apparently authentic app that originally tested negative for malware. The apps even worked like publicized when people downloaded them for the first time.

However, once users installed the apps, an update prompt appeared. Users who made the update allowed malware to be installed as a Trojan horse, “a type of malware characterized by its initially harmless appearance.”

Wired informs that the apps mainly posed as QR scanners, PDF scanners, and cryptocurrency wallets. They all belong to different types of malware and were distributed over four months.

Malicious Footprint

As informed by the specialized portal, “They used several tricks to sidestep restrictions Google has devised in an attempt to rein in the unending distribution of fraudulent apps in its official marketplace.”

“Those limitations include restricting the use of accessibility services for sight-impaired users to prevent the automatic installation of apps without user consent.”

Researchers from ThreatFabric wrote in a post: “What makes these Google Play distribution campaigns very difficult to detect from an automation (sandbox) and machine learning perspective is that dropper apps all have a very small malicious footprint.”

“This small footprint is a (direct) consequence of the permission restrictions enforced by Google Play.”

Google is part of the Entrepreneur Index, which tracks 60 of the largest publicly traded companies managed by their founders or their founders’ families.

Our Editorial Standards

At ValueWalk, we’re committed to providing accurate, research-backed information. Our editors go above and beyond to ensure our content is trustworthy and transparent.

Cristian Bustos
Editor

Want Financial Guidance Sent Straight to You?

  • Pop your email in the box, and you'll receive bi-weekly emails from ValueWalk.
  • We never send spam — only the latest financial news and guides to help you take charge of your financial future.