Google Removes 17 Malicious Apps From Play Store Found With Joker Malware
Google has removed a total of 17 Android apps from its Play Store. The apps were found to be infected with the Joker malware also known as Bread malware Security researchers at Zscaler a California-based IT security firm were able to identify these malicious apps.
In an attempt to protect its users from the risk of malicious apps, Google has removed a total of 17 Android apps from its Play Store. The apps were taken down after they were found to be infected with the Joker malware, also known as Bread malware.
Security researchers at Zscaler, a California-based IT security firm, were able to identify these malicious apps. In a recent blog post, the researchers mentioned that the malware was designed to steal data from the user¡¯s phone.
"This spyware is designed to steal SMS messages, contact lists, and device information, along with silently signing up the victim for premium wireless application protocol (WAP) services," said Zscaler security researcher Viral Gandhi.
Upon notification from Zscaler, Google promptly took down the 17 malicious apps. At the time, however, the malicious apps already had a total of around 120,000 downloads for the identified apps. The following apps were found to be malicious by the security team -
- All Good PDF Scanner
- Mint Leaf Message-Your Private Message
- Unique Keyboard ¨C Fancy Fonts & Free Emoticons
- Tangram App Lock
- Direct Messenger
- Private SMS
- One Sentence Translator ¨C Multifunctional Translator
- Style Photo Collage
- Meticulous Scanner
- Desire Translate
- Talent Photo Editor ¨C Blur focus
- Care Message
- Part Message
- Paper Doc Scanner
- Blue Scanner
- Hummingbird PDF Converter ¨C Photo to PDF
- All Good PDF Scanner
Notorious Malware
In the blog post, the team at Zscaler mentions how the malware has been bugging the security researchers for a long time. Despite their (and Google¡¯s) best efforts to keep it away from Google platforms, the notorious malware manages to find its way back.
To do so, it employs ¡°changes in its code, execution methods, or payload-retrieving techniques,¡± highlights Zscaler.
It recommends users to pay attention to the permission list in the apps that the users install on their Android devices. ¡°Always watch out for the risky permissions related to SMS, call logs, contacts, and more.¡± Reading the reviews on the app page also helps identify such compromised apps.