Five apps that have malware and can steal personal data

As is known, Google Play Store asks a series of requirements for all the apps to be available on the store. However, some apps manage to bypass cyber security regulations, presenting a risk to users.

According to this order of ideas, in the past few hours, a series of applications have been released that hide malware in their operations, the purpose of which is to steal people's data, such as passwords, bank accounts, and many more.

Five apps that have malware and can steal personal data

It is worth noting that one of the most common viruses that uses this type of practice is the so-called "SharkBot", which is able to steal login requests through a fake screen where you must enter your credentials and permissions.

Similarly, the most common technique used by cyber criminals is to send a fake web page or link. This method of cybercrime is known as "phishing". In this sense, the five reported applications are the following:

  • Sound volume, music equalizer.
  • Bluetooth, Wi-Fi and USB triggers.
  • Automatic connection to a Bluetooth device.
  • Fast cleaner and master cooling.
  • TubeBox،

Some viruses hide in applications that users download on their phones.

The phone is in danger: These are the apps that hide dangerous viruses on Android phones

Similarly, other reported apps are: Financial Tracker, Zetter Authenticator and Recover Audio, Images & Video. Apps after installing them ask for an update through APK, which is an installation file outside the Play Store and where the virus is located.

According to user reports, the app takes control of SMS, which is needed for 2-step verification from other apps, because temporary access codes arrive through these means.

Finally, the best recommendation for users is to refrain from installing an external file from the Play Store, since the Google Store is responsible for this process.

The most common virtual scam

Just as the number of people who report these crimes has been established, so too has the type of fraud or the most common way to carry out criminal acts online; And it is that in Colombia it has been proven that the population tends to descend into three ways: phishing, phishing and phishing.

Short text messages or short messages (SMS)

Hello, being a loyal customer of our bank, you have been selected for the lucky winner of the 0 km car. To claim it, you just have to enter the data in the following link…”, many Colombians have received messages like this one; Clicking deception takes effect. This method is known as: Smishing.

Criminals often send text messages pretending to be banks, companies, corporations, etc. When a link is attached, they will be able to access a variety of personal information stored on the device by clicking on it.

Recently, the most popular way has been to pose as companies like Amazon, MercadoLibre, and Facebook; Also in the body of the message, they promise jobs with an income of more than 200,000 pesos per day or prizes, which the user can access by clicking on a fraudulent link or by calling a WhatsApp number.

Phishing or email

This method is similar to the previous one, but instead of SMS, the trap is sent via email. Criminals here often impersonate government or financial entities, as well as online payment companies.

Criminals send emails under the pretext of “updating your data”, in order to obtain private data through which they can access financial information and thus seize your money and financial products.

Cyber ​​security (Getty Photo)

Passwords and other cybersecurity predictions are out by 2023
In the body of the email, the user is informed of an alleged problem with their bank accounts. A worried person enters a scam link and there the scam gets integrated.

Bank phishing

These types of scams are usually carried out through phone calls. Criminals often contact their victims posing as bank advisors or executives. Through this impersonation, they were able to gain the trust of the people.

Then, they ask for information such as the last 4 digits and security numbers, thus they are able to grab the product.
No comments
Post a Comment