Not all the apps you download or install on your phone from Google Play Store are safe. As per the latest details 4 malicious Android apps have been found on Google Play Store that can lead you to harmful phishing sites and can even steal your private information secretly. These four bad apps are from developer Mobile apps Group and are listed on Google Play. Also, these apps are infected with Android/Trojan.HiddenAds.BTGTHB and have amassed at least one million downloads. “A family of malicious apps from developer Mobile apps Group are listed on Google Play and infected with Android/Trojan.HiddenAds.BTGTHB. In total, four apps are listed, and together they have amassed at least one million downloads. Older versions of these apps have been detected in the past as different variants of Android/Trojan.HiddenAds. Yet, the developer is still on Google Play dispensing its latest HiddenAds malware,” according to a blog post by Malwarebytes . The four Android applications that have been detected on Google Play with the malware that you need to delete right away if you have installed them are: 1. Bluetooth Auto Connect 2. Bluetooth App Sender 3. Driver: Bluetooth, Wi-Fi, USB 4. Mobile transfer: smart switch These apps do not show any unusual or malicious behaviors in the first 72 hours of the installation of the app, according to Malwarebytes. Also, these apps have had a long history of being infected with different variants of HiddenAds. You are advised to delete these applications if you have them installed in your phone. According to the blog post, the apps open phishing sites in Google Chrome even when the device is locked. And as the user unlocks the device, they are taken to a new tab with the latest malicious site. After this you will observe new tabs opening frequently with a new site and that too automatically. These malware range from using harmless tricks, generating revenue via pay-per-click to stealing users’ sensitive information.
Published on : 2022-11-07 08:02:09
Source :hindustantimes_tech
Article from : See Article