Also, these apps aren’t visible on the home screen, and their icon remains hidden to prevent uninstallation. So, they can continue their malicious operations even if the app isn’t in use. Researchers believe that the hacker must have used mobile device emulators or installed farms to show huge numbers and improve the apps’ ranking on the store.Īnother tactic is minimal user interaction since the apps can launch automatically when the system starts. For instance, spyware shows a large user base but doesn’t feature any reviews. The hacker has used various techniques to make these apps appear legitimate. Device’s contact lists (all linked accounts, email and social networks).The spyware apps collected the following data: Research revealed that the apps collected highly personal data from their targets and transferred it to over one hundred different destinations, all of which were in China and were malicious. The app profiles on the Google Play Store state that they don’t collect any data from the device, but according to Pradeo’s blog post, these are false claims. Malicious apps (Pradeo) What Data Did These Apps Collect?
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |