Attack of the copycats: How impostor apps and fake app mods could bite you

Instant communication services are among the most popular apps on iOS and Android alike - US non-profit operation Signal has an estimated 40 million users, with the figure rising to 700 million for Telegram, another open-source messaging service.
Their popularity has also attracted the scrutiny of threat actors, keen to find a way to sneak malware onto your device.
Often they will produce malicious copycat apps designed to mimic legitimate ones.
They can then distribute them via phishing messages in email, by text, on social media or the communications app itself, taking the victim to a scam page and mislead them into installing what they believe to be an official app.
Or they could direct users to legitimate-looking fake app that may occasionally make it through the strict vetting procedures on the Google Play marketplace.
Apple's iOS platform has a far more locked-down ecosystem and it's even less rare for malicious apps to end up there.
Performance issues, because malicious apps may change the device's settings and features and slow it down.
Ransomware designed to completely lock down the device until a fee is paid.
A 2021 fake update campaign that spread on WhatsApp, Signal and other messaging apps via phishing messages claiming the recipient could obtain a new color theme for WhatsApp.
In reality, the WhatsApp pink theme was Trojan malware which automatically replied to messages received in WhatsApp and other messaging apps with a malicious link.
Once installed, the apps were designed to intercept victims' chat messages in a bid to pilfer their sensitive information and cryptocurrency funds.
China-aligned hackers hid cyberespionage malware known as Android BadBazaar inside legitimate-looking Signal and Telegram apps.
Both app types made it through official vetting and onto the Google Play and Samsung Galaxy Store, before Google/Samsung were made aware of it.
While WhatsApp explicitly bans unofficial versions of its app, the open-source Telegram encourages third-party developers to create their own Telegram clients.
Always stick to official Android app stores, as they have rigorous vetting processes in place to keep malicious apps off the platform.
Always check the developer's reputation online and any reviews for the app - watching out for mention of scams.
Uninstall any apps that you don't use, so it's easier to keep track of what's on your device.
Avoid clicking on advertising online, in case it's part of a scam designed to lead you to a malicious copycat app.
Be wary of granting an app permissions that seem unrelated to its functionality, as it could be malware trying to access your data.
Always use a mobile security solution from a reputable provider as this will help to block malicious installs and/or prevent malware working on your device.


This Cyber News was published on www.welivesecurity.com. Publication date: Thu, 11 Jan 2024 08:43:04 +0000


Cyber News related to Attack of the copycats: How impostor apps and fake app mods could bite you

Attack of the copycats: How impostor apps and fake app mods could bite you - Instant communication services are among the most popular apps on iOS and Android alike - US non-profit operation Signal has an estimated 40 million users, with the figure rising to 700 million for Telegram, another open-source messaging service. ...
1 year ago Welivesecurity.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
3 months ago Aws.amazon.com
Fake app impersonating LastPass spotted in Apple's App Store The Register - LastPass says a rogue application impersonating its popular password manager made it past Apple's gatekeepers and was listed in the iOS App Store for unsuspecting folks to download and install. A screenshot of the fake LastPass app in the Apple App ...
11 months ago Go.theregister.com
ChatGPT Clone Apps Collecting Personal Data on iOS, Play Store - On Android devices, one of the apps analyzed by researchers has more than 100,000 downloads, tracks, and shares location data with ByteDance and Amazon, etc. ChatGPT, the AI software, has already taken the Internet by storm, and that is why ...
1 year ago Hackread.com
Pig Butchering: Fake Trading Apps Target Crypto on Apple, Google Play Stores - Pig Butchering scam targets crypto users with fake trading apps on Apple and Google Play Stores. These apps, found on Apple’s App Store and Google Play, and on phishing sites, are part of a Pig Butchering scam targeting cryptocurrency investors ...
3 months ago Hackread.com
Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk - Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they are notoriously hard to trust. In an age when technology is constantly evolving, it is almost impossible to tell if a ...
1 year ago Cysecurity.news
Fake LastPass password manager spotted on Apple's App Store - LastPass is warning that a fake copy of its app is being distributed on the Apple App Store, likely used as a phishing app to steal users' credentials. The fake app uses a similar name to the genuine app, a similar icon, and a red-themed interface ...
11 months ago Bleepingcomputer.com
Halting Hackers on the Holidays 2023 Part II: The Apps You Trust - Most free flashlight apps are creepware - also known as malware that spies on you and your online behavior and could pass along information to others. The problem doesn't begin and end with flashlight apps, though. Many seemingly innocuous apps that ...
1 year ago Cyberdefensemagazine.com
This year's resolution: remove nosey apps from your device - Some apps are plain greedy-like a stranger you invite for a meal who insists on ordering everything on the menu. Here's what upset me: After I downloaded the companion app that helps control it for my phone, the app wanted permission to make and ...
1 year ago Blog.avast.com
Halting Hackers on the Holidays 2023 - As we saw with major holidays including Black Friday and Cyber Monday and now right around the corner and a massive increase in shopping online for the Christmas season, we count the breaches and total personally identifiable information records lost ...
1 year ago Cyberdefensemagazine.com
Crypto scam apps infiltrate Apple App Store and Google Play - Operators of high-yielding investment scams known as "Pig butchering" have found a way to bypass the defenses in Google Play and Apple's App Store, the official repositories for Android and iOS apps. Pig butchering scams have been happening for a few ...
1 year ago Bleepingcomputer.com
Ushering in the Next Phase of Mobile App Adoption: Bolstering Growth with Unyielding Security - In recent years, mobile apps have surged in popularity providing consumers with instant access to a variety of life essentials such as finances, education, and healthcare to life's pleasures such as shopping, sports, and gaming. With the popularity ...
1 year ago Cyberdefensemagazine.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
Fake LastPass Password Manager App Lurks on iOS App Store - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
11 months ago Hackread.com
Digital Battlefields: Artists Employ Technological Arsenal to Combat AI Copycats - Technology is always evolving, and the art field has been on the frontline of a new battle as a result - the war against artificial intelligence copycats. In the fast-paced world of artificial intelligence, it is becoming more and more important that ...
1 year ago Cysecurity.news
Fake Lockdown Mode Exposes iOS Users to Malware Attacks - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
Fake hotel reservation phishing scam uses PDF links to spread MrAnon Stealer - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
Interpol Busts Human Traffickers Luring Victims with Fake Online Job Ads - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
Fake Resumes, Real Malware: TA4557 Exploits Recruiters for Backdoor Access - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
SEC X Account Hacked, Tweets Fake News About Bitcoin ETFs - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
Beware of Fake LastPass App that Steal Personal Information - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
11 months ago Cybersecuritynews.com
Microsoft: Storm-1283 Sent 927,000 Phishing Emails with Malicious OAuth Apps - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
New Xamalicious Backdoor Infects 25 Android Apps, Affects 327K Devices - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
Signal, AI Generated Art Least, Amazon, Facebook Most Invasive Apps - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
1 year ago Hackread.com
The Fake Fix: New Chae$ 4.1 Malware Hides in Driver Downloads - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
1 year ago Hackread.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)