• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Over 200 Apps on Play Store Caught Spying on Android Users Using Facestealer

You are here: Home / Cyber Security News / Over 200 Apps on Play Store Caught Spying on Android Users Using Facestealer

More than 200 Android applications masquerading as exercise, picture editing, and puzzle apps have been observed distributing spyware identified as Facestealer to siphon consumer credentials and other valuable facts.

“Very similar to Joker, a further piece of cell malware, Facestealer changes its code regularly, thus spawning lots of variants,” Pattern Micro analysts Cifer Fang, Ford Quin, and Zhengyu Dong said in a new report. “Considering that its discovery, the spyware has continuously beleaguered Google Play.”

Facestealer, first documented by Medical doctor Web in July 2021, refers to a group of fraudulent applications that invade the formal app market for Android with the aim of plundering delicate facts this sort of as Facebook login qualifications.

Of the 200 applications, 42 are VPN providers, adopted by a digital camera (20) and image editing purposes (13). In addition to harvesting credentials, the apps are also made to obtain Fb cookies and individually identifiable info linked with a victim’s account.

Moreover, Trend Micro disclosed that it uncovered around 40 rogue cryptocurrency miner applications that focus on consumers fascinated in digital cash with malware built to trick end users into viewing ads and paying for subscription solutions.

Some of the bogus crypto apps, this kind of as Cryptomining Farm Your possess Coin, take it one particular move even further by also trying to steal personal keys and mnemonic phrases (or seed phrases) that are applied to recover entry to a cryptocurrency wallet.

To keep away from falling sufferer to such scam applications, it can be recommended that users verify unfavorable assessments, verify the legitimacy of the developers, and stay away from downloading apps from third-occasion app stores.

New review analyzes destructive Android apps set up in the wild

The conclusions appear as scientists from NortonLifeLock and Boston College revealed what they termed the “major on-system examine” of potentially dangerous apps (PHAs) on Android-dependent on 8.8 million PHAs set up on about 11.7 million equipment involving 2019 and 2020.

“PHAs persist on Google Enjoy for 77 times on normal and 34 days on third-occasion marketplaces,” the review pointed out, pointing out the delay among when PHAs are determined and when they are eliminated, including 3,553 apps exhibit inter-marketplace migration immediately after remaining taken down.

On major of that, the analysis also demonstrates that PHAs linger for a much for a longer period period of time on typical when buyers switch units and routinely put in the apps when restoring from a backup.

As several as 14,000 PHAs are claimed to have been transferred to 35,500 new Samsung equipment by utilizing the Samsung Wise Swap mobile app, with the apps lasting on the telephones for a period of close to 93 days.

“The Android security model seriously restrictions what mobile security merchandise can do when detecting a malicious application, allowing for PHAs to persist for lots of days on victim products,” the teachers stated. “The present warning system employed by cellular security packages is not efficient in convincing users to immediately uninstall PHAs.”

Uncovered this report fascinating? Observe THN on Fb, Twitter  and LinkedIn to go through additional exceptional material we put up.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Apple will allow some apps to automatically charge you higher subscription prices
Next Post: US and EU Move Closer on Cyber in New Trade Pact »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © 2025 · AllTech.News, All Rights Reserved.