These imposter apps are hiding malware
Malware comes in many different forms. But it always has the same objective. To rip you off.If you think you have a device infected with malware, you must remove it ASAP. Tap or
click here for steps to remove malware from your phone or computer. Better yet, we all need to take preventative measures to avoid malware before it’s too late.Cybercriminals are
making that more difficult than ever. They are updating old malicious code versions to evade app store detection. Keep reading for details on these dangerous threats and ways to
stay protected.Here’s the backstoryLast year a hacker appeared on cybercriminal forums, selling the ERMAC Trojan for $3,000 a month. The criminal claimed it could target 378
applications and steal banking passwords, usernames, email addresses and wallet funds. The malware went through an update earlier this year, now capable of targeting 467
applications while garnering a $5,000 monthly rental fee. However, it seems that the creator isn’t entirely done spreading malware. Your daily dose of tech smarts Learn the tech
tips and tricks only the pros know. According to research from ThreatFabric, the bad actors behind the malware are selling different versions of malicious code on the Dark Web.
They are selling malware targeting Android devices and desktop malware targeting Windows users. Threats include desktop malware Erbium, Aurora stealer and Laplas clipper. The code
is being spread through malicious apps that impersonate legit programs. The threat was discovered when a malicious app was caught masquerading as a Wi-Fi authorization app. It was
distributed through a fake one-page website containing only two buttons.Image source: Threatfabric.comWhichever button you click, the malware installs onto your device. This
malware can:Steal emails from Gmail.Hijack two-factor authentication codes.Steal credentials for cryptocurrency wallets.Record keystrokes on your device.What you can do about itOne
key to this attack being successful is convincing victims to download apps from third parties. This brings us to a great rule to live by, only download apps and programs from
official sources.If you follow a link to an app found on social media or a shady website, the program could be spoofed and designed to infect your device with malware. Official app
stores have more robust security protocols in place to help keep malicious apps out.ThreatFabric found a few malicious apps that are impersonating the real deal. Here are some
Read More
examples:Wi-Fi Auto Authenticator.Football live stream.OGInsta+ Mod.VidMate.If you see any of these programs being offered on social media or anywhere other than the Google Play
Find Out
More