News

Google Warns PlayStore Users About Android Trojans, Commits to Play Protect

Google has warned PlayStore users that the Android banking trojans can arise in popular apps.  The company has finally put an effort into protecting Android with its tightened control, marking the end of the app free-for-all.  

The sideloading app restrictions through various Play Store regulations will bring about live threat detection in Android 15 by means of Play Protect. These are aimed at closing the gap opened up by security between Android and Apple's closed iOS.

Kaspersky's Alert: Trojan in Popular Apps

Google Warns PlayStore Users About Android Trojans, Commits to Play Protect
(Photo : Pathum Danthanarayana/Unsplash)
The new Google PlayStore changes are rolling out and while they're still hot, the company has advised the users to be cautious about Android banking trojans.

A scare from Kaspersky researchers found a serious situation in modified versions of popular software, such as Spotify, WhatsApp, and Minecraft. These modified apps mostly downloaded from non-official platforms have been infected with a dangerous form of malware called the Necro Trojan.

The first detection of the Necro Trojan was in the CamScanner app, which had been downloaded more than 100 million times back in 2019. 

Today, it's said to be embedded in applications available on the Google Play Store as well as mod versions located on unofficial platforms. Kaspersky lately detected it in a modified version of Spotify and Wuta Camera, which had downloaded more than 10 million copies from the Google Play Store.

The take-home from this report is: stay away from modded apps and other third-party app stores. Apps on the Play Store, like Facebook, can sometimes harbor malware; so, be wary even of established market drivers like Facebook.

Read Also: Samsung Mocks Apple Over Stale iPhone Designs-But Are They Really Winning?

The Risks of Necro Trojan

What makes the Necro Trojan particularly terrifying is its use of cutting-edge obfuscation tactics, making it that much more challenging to catch. From there, the malware can download and run more apps, install new software unbeknownst to the user, subscribe to paid services, interact with ads invisibly, and run malignant JavaScript code.

According to Forbes, the best security defense you can do is to download apps from approved sources and not take apps used by millions at face value.

Cleafy's Find: TrickMo Trojan Flies Again

Another disturbing report emerged from Cleafy, who presented a new version of the TrickMo Trojan; that is, an offspring of the infamous TrickBot malware. The newly found version has several advanced mechanisms against analysis, which make it more troublesome for security software to identify.

TrickMo is quite feature-rich: besides intercepting one-time passwords (OTPs), screen recording, keylogging, and even remote control of infected devices, it camouflages itself like a Google Play services update to trick users into enabling Accessibility services, which gives it very wide instrumentation of the device.

Google's Move: Play Protect to the Rescue

The response from Google has been the removal of the threat from the Play Store, while redoubling its commitment to Play Protect. The security component is enabled by default on Android devices and identifies and blocks known malware, including both variants of Necro and TrickMo.

Users are requested by Google to ensure that Play Protect is always active because it automatically protects against confirmed threats and can help prevent future infections.

The New Malware Alert: Octo2 Trojan Targets Android Users

ThreatFabric issued a warning concerning the new version of the Octo Trojan, named Octo2. The malware threatens to exploit users on the entire planet, especially across Europe, the USA, and Asia, through Malware-as-a-Service campaigns.

It masquerades as other reputable applications like Google Chrome or NordVPN, in which it deceives users to download the malware. It reads push notifications from targeted applications, thus enabling hackers to get hold of sensitive and financial information, such as banking credentials.

Must Know Android Security Basics to Protect Yourself From Android Threats

To protect your device from emerging threats, the following best practices have been suggested:

  • Only rely on official app stores - avoid third-party app stores, and do not change your security settings to sideload applications.
  • Verify App Developers - Know who the developer of an app is before downloading it. Is he or she trustworthy? Do reviews appear legitimate?
  • Limit App Permissions - Be leery of what you give access to your device. For example, do you really need to give access to your contacts or camera in order to use the flashlight app?
  • Review Apps Periodically - Review the apps on your device every month or so and delete those that are no longer needed or used.
  • Do not download the modded apps- Unless you are absolutely sure of the safety of different apps that are popular, it would be better if you avoided downloading the most popular apps in modded versions.

In other words, though Google is doing quite a good job of cleaning out the Android software ecosystem, it remains the user who is still vigilant. Be sure to install apps from the official app stores, be sure to activate Play Protect, and be rather specific with regard to granting app permissions in order not to let your device fall prey to all the evolving malware.

Related Article: Samsung's September 2024 Update: What's New and Which Devices Are Getting It

© Copyright 2024 Mobile & Apps, All rights reserved. Do not reproduce without permission.

more stories from News

Back
Real Time Analytics