Android user? Watch Out from These Apps.

Android user?  Watch Out from These Apps.

Red Alarm SandStrike spyware infect Andriod devices via 4 apps.

According to malwarebytes , Four malicious apps from developer Mobile apps Group on Google Play infect android apps with Android/Trojan.HiddenAds.BTGTHB.

The four apps have at least million downloads until now

The apps are :

SandStrike spyware apps.png

Even while the mobile device is locked, website tabs are opened in the background
The content of the phishing sites are harmless sites like adult content , or pages tells the users he is infected and need to install last updates. Those all to produce pay-per-click, and others are more dangerous phishing sites that attempt to trick unsuspecting users A new tab opens with a new site frequently, and as a result, unlocking your phone after several hours means closing multiple tabs. The users browser history will also be a long list of phishing sites.

Can anything be done to stop Android malware? Google has released measures that will protect users from installing apps that may not have the latest privacy and security features.

Related Posts

Web Application Security - Challenge-13

Web Application Security - Challenge-13

Can you get the admin cookie?

Esperienza di Tirocinio in Sorint.lab: Dalla Teoria dei SAST alla Pratica con Semgrep

Esperienza di Tirocinio in Sorint.lab: Dalla Teoria dei SAST alla Pratica con Semgrep

Dal Codice alla Sicurezza: Un Viaggio Formativo tra Teoria e Pratica

 Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Il caso di CrowdStrike dimostra quanto sia essenziale investire in attività di QA e testing. Questi processi non solo migliorano l'affidabilità e la sicurezza del software, ma proteggono anche le azie

Polyfill js - Another Supply Chain Attack

Polyfill js - Another Supply Chain Attack

What happens if a popular open-source JavaScript library get hacked?

Agile and Security

Agile and Security

How Agile practices can improve the shift security left approach

MongoDB RomeMUG: Meet Up #9

MongoDB RomeMUG: Meet Up #9

"Deploy an Application on MongoDB Atlas"

Automated TLS Certificate Management

Automated TLS Certificate Management

TLS Certificate

Web Application Security - Challenge-12

Web Application Security - Challenge-12

Can you trigger an XSS?