Users of Android worried about the privacy of your data and mobile security in general, once again face a challenge: a new list of newly detected malicious applications.
In this sense, there are applications that put danger from the bank account to the passwords, going through all kinds of financial services and money transfer platforms.
Some of these extremely dangerous trojans were carefully hidden inside popular apps, which seemed legitimate, but had a purpose of collecting data, a company called AppCensus.
The number of possible victims is counted in “at least 60 million people according to the American newspaper The Wall Street Journal.
The applications mentioned are:
- Speed Camera Radar
- Al-Moazin Lite (Prayer Times)
- Wi-Fi Mouse (remote control PC)
- QR & Barcode Scanner (Developed by AppSource Hub)
- Qibla Compass – Ramadan 2022
- Simple weather & clock widget (developed by Difer)
- Handcent Next SMS-Text with MMS
- SmartKit 360
- Al Quran MP3 – 50 Reciters & Translation Audio
- Full Quran MP3 – 50+ Languages & Translation Audio
- Audiosdroid Audio Studio DAW
Between the Applications there are some very popular Muslim prayer, and also QR code readers; as well as weather tools and messaging services.
On the other hand, there are other unidentified applications that can also carry the same potentially malicious software. All Android apps (named and unnamed) that were spying on their users were reportedly removed from the official Play Store as of March 25. However, this did not prevent them from “coming back” sometime between that date.
According to the site PhoneArena, Google It promises to have verified that they are no longer invasive or problematic apps before listing them again. “Those who installed these apps before AppCensus discovered them and published the findings of its investigation should hit ‘remove’ even though their unauthorized data collection behavior has recently been stopped,” they recommend.
Experts warn the aforementioned medium that such applications collected all kinds of sensitive information, from email addresses to phone numbers, passwords and precise GPS location history, which a suspicious company called Measurement Systems paid to collect via a third-party SDK (software development kit) built into the mentioned apps. In this regard, Measurement Systems denied all the accusations.