[ad_1]
Cyber security Researchers have once again helped Google remove malicious apps from the official Play Store. Crypto mining service.
Security company Trend Micro 8 such flags Android appRequested the user to pay for a cloud mining operation that did not exist.
“As a result of the analysis, these malicious apps simply trick victims into seeing ads, pay an average of $ 15 per month for subscription services, and pay for improved mining capabilities without any reward. I found out that there is. ” Written by Cifer Fang, Trend Micro Mobile Threat Analyst.
We are investigating how our readers are using VPNs on streaming sites such as Netflix, so we can improve our content and provide better advice. This survey takes less than 60 seconds. We would appreciate it if you could share your experience.
>> Click here to start the survey in a new window
According to Fang, all eight flagged apps were found to be infected with either AndroidOS_FakeMinerPay or AndroidOS_FakeMinerAd malware.
Difficult battle
This isn’t the first time researchers have found a malicious app on the Play Store trying to take advantage of the cryptocurrency epidemic.
Just last month, Lookout Threat Lab Identified about 170 such appsMore than 20 of them are listed on the Play Store, tricking thousands of users into paying for non-existent cloud mining operations.
As before, Google acted swiftly to remove the eight malicious apps highlighted by Trend Micro. However, this is just the tip of the iceberg.
“Based on Trend Micro mobile app reputation service (MARS) data, over 120 fake cryptocurrency mining apps are still available online. They don’t have cryptocurrency mining capabilities and trick users into watching in-app ads. These apps have affected more than 4,500 users worldwide between July 2020 and July 2021, “Fang reveals.
Some malicious apps can break into the Play Store, but to protect against threats, we recommend downloading the app only from the official app store and checking for new services online to verify its legitimacy. increase.
[ad_2]