If you keep downloading more and more apps from Google Play store, just be a bit cautious. It’s why because cyber criminals are nowadays behind the mobile platforms like Android. And with their own malicious apps, they are always in search of users’ private information like PINs, bank account passwords and so on. Reports from various cyber security providers have confirmed it.
An app turns out to be malicious when it contains malware – programs or file that it is intentionally, by reverse-engineering added to it. Once the app gets to a device, it starts doing the purpose it’s there for.
Because these malicious programs are installed on a device alongside a wanted app, and in most cases with users’ consent, a malicious program is capable of carrying out any code in the device. In result, users’ private information is stolen. It may further download more malware.
There are some malware programmes which can even steal information you are putting in the browser. It means a user having installed malicious app will share everything he or she is doing on his browser.
Although Google has tightened the app approval process but many app developers also publish their apps on the stores other than Google Play. There, on other stores, are chances that the app is repackaged with additional software which may be a malware also.
A malware like RookieUA is quite dangers as it steals users’ ID and password of several accounts. The malware is a straight example of how cyber criminals manage to bypass Google stringent controls.
Gooligan is another malware found several times on Android devices. It is capable of routing these devices and email addresses as well as storing authentication tokes on the devices.
When attackers have the private information of users, and unrestricted access to Google account data like Photos, Gmail and Drive, they can get it, take advantages of it.
The Gooligan infection begins when a users downloads and install an app carrying this malware. Once the app is installed, the app sends data about of the device to controllers or servers.
Ztorg malware is able to obtain escalated privileges on Android device and install themselves in system directory. It may also install other apps on users’ devices.
So these are some examples of malwares which are still available; however, apps carrying these malware programs are downloaded from third party app stores.
Users can provide safety to their devices by not downloading apps from other apps stores. Also, mobile app developers need to create better code which can hardly be reversed engineered by malware attackers.
Author Bio :- James Stewart is the technical writer of Mobilmindz that helps startups and enterprises in mobile technology and having a great experience in e learning app development, finance app development etc.