Current cyber threat
Fake apps threaten Android users. Find out how you can protect yourself from fake apps from Instagram, WhatsApp, etc.
News
Die Security experts from SonicWall Capture Labs have discovered a new threat to Android users: fake apps that disguise themselves as popular applications such as Instagram, WhatsApp and Google. These apps aim to steal personal data and take control of the smartphone.
Fake apps are nothing new, but the current wave of malware is particularly perfidious. The malicious applications use the icons and names of well-known apps to deceive users. One example is the app “Instagram indo”, which pretends to be the original Instagram.
How fake apps work
Once installed, these apps request deep permissions such as “Device Management” and “Accessibility.” These permissions allow the malware to take control of the smartphone and perform malicious actions without the user noticing.
The fake apps connect to third-party servers to receive instructions. These instructions can include spying on messages, callers, and contacts, as well as sending phishing URLs. The phishing URLs lead to fake websites that capture login information.
Fake apps are difficult to distinguish from the original
Compared to previous threats, the current fake apps are particularly difficult to detect because they look almost identical to the real apps. They also use advanced techniques to bypass security mechanisms such as two-factor authentication. For users, this means a high risk of identity theft and financial loss.
By identifying and avoiding these apps, users can protect their data and privacy. To do this, users should make sure to only download apps from trusted sources such as the Google Play Store and carefully check the apps’ ratings and permissions.
FAQ: Questions and answers about fake apps
- How do I recognize a fake app?
Look for small differences in the app name and logo. Check the permissions and read user reviews. - What should I do if I have installed a fake app?
Uninstall the app immediately and change all passwords. Use security software to scan your device. - How can I protect myself from fake apps?
Only download apps from trusted sources like the Google Play Store and check the apps’ permissions and ratings. - Are apps in the Google Play Store also affected?
Yes, fake apps can also appear in the Google Play Store, so always be alert. - Which permissions are suspicious?
Permissions such as “device management” and “accessibility” should be questioned, especially if they are requested by an unknown app.
Next matching articles
Continue to home page
Source: www.connect.de