85 Malicious Apps found on Google Play Store Implied Stealing Login Credentials


85 Malicious Apps found on Google Play Store 

Kaspersky reported:-

Whatsoever is amusing that the American president Donald Trump banned Kaspersky antivirus from existing users on a government computer. Due to political allegations. The malware caught by Kaspersky researchers was targeting especially Russian-speaking victims, users of VK. Yet, malware is known to instantly change and adapt, and target wider lakes of victims.

Also though the apps stayed leveraged only to cheat passwords for one particular social network, VK, some of them have been available for quite a while. The individual particular app charged Mr. President Trump, found more than one million downloads solely! This app is, in fact, a game published beginning this year, in March 2017. All of the apps applied in this malware operation were prompting users to give away their login credentials

Read Also:k money-taker hackers from 10 million us ban

Also, the apps had been a possibility to authenticate on VK, asking implied victims to give their login credentials. This application is standard for game apps as they enter social network functionalities for more articles. Such a stories involve sharing high scores on the platform, or getting premium content, researchers explain.

assumed all users are requested to change the passwords for their accounts.

These cybercriminals were publishing their malicious apps on Google Play store for more than two years so they had to modify their code to bypass detection. We think that cybercriminals use stolen credentials mostly for promoting groups in VK.com. They silently add users to promote various groups and increase their popularity by doing so,”

Kaspersky wrote.

The apps are removed from Google Play Store. otherwise, all users suspect that their accounts may have been compromised should change their passwords quickly.

Last year, the Marcher Android Trojan had been updated to show fake login screens. The Trojan was producing so to borrow the victim’s credentials for several popular Android apps. Started in 2013, this Android Trojan has been quite active on Google Play. Its primary purpose has always been harvesting user credentials and credit card data.