Google warning: Your Android phone might be infected already – check for these dangerous HIDDEN apps

DODGY apps claiming to protect people's phones from cybercrime have actually been caught doing the dirty themselves.

Experts have exposed six apps masquerading as do-gooding antivirus tools.

But in reality, the software was spreading banking malware designed to help hackers steal passwords and get into accounts.

The dubious apps were downloaded more than 11,000 times, according to Check Point Research who uncovered the scam.

More than a third of victims are believed to be from the UK and the rest have been mostly traced back to Italy.

For the most part, they were found on Android.

Read more about Android

Android and iPhone users warned Russian search engine could be taking data

Google warns users that thousands of apps will be ‘hidden’ over security risk

Google has since removed the bunch, but that doesn't protect anyone who's already downloaded them.

The six apps are:

  • Atom Clean-Booster, Antivirus
  • Antivirus, Super Cleaner
  • Alpha Antivirus, Cleaner
  • Powerful Cleaner, Antivirus
  • Center Security – Antivirus (available in two versions)

If you have them installed on your phone, you should remove the apps immediately and consider changing your passwords.

Most read in News Tech

DINO-POCALYPSE

Dinosaur 'that died the DAY asteroid struck' found in world-first discovery

YOU'RE A WIZARD!

I'm a street magician – here's an easy iPhone magic trick to fool friends

CHECK IT

Google urges ALL drivers to check Maps app right now

BIG CHARGE

Three warning signs 'your iPhone cable could kill you' – check your charger NOW

Malware called Sharkbot was found lurking under the bonnet of the apps.

It's a banking trojan known for luring victims into entering their login details in spoofed popups.

The precious data is then secretly sent off to hackers who can then access everything including emails, social media and banking accounts.

Hackers 'speak Russian'

Experts assume the perpetrators speak Russian from their investigation.

Adding to suspicion, they noticed the apps were programmed not to work against anyone located in China, India, Romania, Russia, Ukraine or Belarus.

But, they said they don't have enough evidence to point the finger at who exactly is behind it.

"Looking at the install count we can assume that the threat actor hit the bulls-eye for their method of malware spread," said Alexander Chailytko, a cyber security at Check Point Software.

"The threat actor strategically chose a location of applications on Google Play that have users’ trust.

"What’s also noteworthy here is that the threat actors push messages to victims containing malicious links, which leads to widespread adoption.

Read More on The Sun

Russia’s ‘chilling order to wipe out civilians in horrifying radio message’

Katie Price ‘in hospital’ as star sparks concern weeks after love split

"All in all, the use of push-messages by the threat actors requesting an answer from users is an unusual spreading technique.

"I think it’s important for all Android users to know that they should think twice before downloading any antivirus solution from the Play Store."

  • Read all the latest Phones & Gadgets news
  • Keep up-to-date on Apple stories
  • Get the latest on Facebook, WhatsApp and Instagram

Best Phone and Gadget tips and hacks

Looking for tips and hacks for your phone? Want to find those secret features within social media apps? We have you covered…

  • How to get your deleted Instagram photos back
  • How to track someone on Google Maps
  • How can I increase my Snapchat score?
  • How can I change my Facebook password?
  • How can I do a duet on TikTok?
  • Here's how to see if your Gmail has been hacked
  • How can I change my Amazon Alexa voice in seconds?
  • What is dating app Bumble?
  • How can I test my broadband internet speed?
  • Here's how to find your Sky TV remote in SECONDS

We pay for your stories! Do you have a story for The Sun Online Tech & Science team? Email us at tech@the-sun.co.uk

    Source: Read Full Article