Android user? Watch Out from These Apps.

Android user?  Watch Out from These Apps.

Red Alarm SandStrike spyware infect Andriod devices via 4 apps.

According to malwarebytes , Four malicious apps from developer Mobile apps Group on Google Play infect android apps with Android/Trojan.HiddenAds.BTGTHB.

The four apps have at least million downloads until now

The apps are :

SandStrike spyware apps.png

Even while the mobile device is locked, website tabs are opened in the background
The content of the phishing sites are harmless sites like adult content , or pages tells the users he is infected and need to install last updates. Those all to produce pay-per-click, and others are more dangerous phishing sites that attempt to trick unsuspecting users A new tab opens with a new site frequently, and as a result, unlocking your phone after several hours means closing multiple tabs. The users browser history will also be a long list of phishing sites.

Can anything be done to stop Android malware? Google has released measures that will protect users from installing apps that may not have the latest privacy and security features.

Related Posts

 Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Il caso di CrowdStrike dimostra quanto sia essenziale investire in attività di QA e testing. Questi processi non solo migliorano l'affidabilità e la sicurezza del software, ma proteggono anche le azie

Polyfill js - Another Supply Chain Attack

Polyfill js - Another Supply Chain Attack

What happens if a popular open-source JavaScript library get hacked?

Agile and Security

Agile and Security

How Agile practices can improve the shift security left approach

MongoDB RomeMUG: Meet Up #9

MongoDB RomeMUG: Meet Up #9

"Deploy an Application on MongoDB Atlas"

Automated TLS Certificate Management

Automated TLS Certificate Management

TLS Certificate

XZ Backdoor (CVE-2024-3094) - A hidden backdoor in open-source software

XZ Backdoor (CVE-2024-3094) - A hidden backdoor in open-source software

How a malicious actor was able to gain credibility and inject malicious payload in a popular unix-like compression library

Windows Server & VPN SSL - MFA with Azure AD

Windows Server & VPN SSL - MFA with Azure AD

MFA implementation with Entra ID

Tor Browser: un piccolo report sulle problematiche relative alla privacy

Tor Browser: un piccolo report sulle problematiche relative alla privacy

Una risposta agli attacchi relativi alla privacy