In a crazy incident, at least Android druggies downloadedanti-malware apps from Google Play Store which, rather of guarding them from hackers, infected their bias to steal watchwords, bank details and other particular information, a new report showed on Thursday.
The six malware apps in the disguise ofanti-virus apps have now been removed by Google from Play Store but the damage was done.
According to cyber security experimenters at Check Point, the apps infected over druggies with Sharkbot Android malware which steals credentials and banking information.
“This malware implements a geofencing point and elusion ways, which makes it stand out from the rest of malwares. It also makes use of commodity called sphere generation algorithm (DGA), an aspect infrequently used in the world of Android malware,” according to the Check Point report.
It linked roughly unique IP addresses of infected bias during the time of analysis. Utmost of the victims were from Italy and the UK.
Sharkbot lures victims to enter their credentials in windows that mimic benign credential input forms. When the stoner enters credentials in these windows, the compromised data is transferred to a vicious garçon.
“Sharkbot does not target every implicit victim it encounters, but only select bones, using the geo-fencing point to identify and ignore druggies from China, India, Romania, Russia, Ukraine or Belarus,” said the report.
” Overall, we saw over downloads of these apps from Google Play,”it added.
Trouble actors are evolving and constantly seeking ways to fit and drop malware at any means possible, including disguising as licit” sanctioned”apps.
After examining the apps, Google progressed to permanently remove these operations on Play store.