Cybersecurity researchers have found that Joker malware has spread through a total of 11 Android apps on the Google Play Store. This was first reported by ZDNet.
This time again, the Joker virus has re-targeted the new Android app. Malware virus steals users’ data including SMS, contact list, device info, OTP and much more.
With more and more people using the Internet regularly, the incidence of dangerous malware affecting mobile phones is increasing at a rapid rate. Meanwhile the infamous Joker malware is back and has reportedly managed to hide through the Google Play store.
This is not the first time we are hearing about Joker malware. Most malware like Joker comes with the ability to influence smartphone users and steal their personal data, spy on chat and other apps, and sometimes even steal stored financial details such as debit and credit card details. As in the previous examples, the Joker malware has again managed to spread through the Google Play Store.
Cyber security researchers have found that malware has spread through a total of 11 Android apps on the Play Store. This was first reported by ZDNet. Infected apps include apps like Translate Free, PDF Converter Scanner, Free Effluent Messages, Deluxe Keyboard.
What is Joker malware and how does it work?
Researchers have found that these apps have managed to get more than 30,000 installs. Such apps are said to commit financial fraud. Researchers at Zscaler’s ThreatLabz have also found that these apps often deceive users by luring them with features needed for productivity, communication and other tasks. The report states that Google has removed all these 11 apps from the Play Store.
Unlike the previous version, the latest and updated version of the Joker malware uses a new method of infecting mobile devices. The malware downloads the malware “payload” using a URL shortener, which means it uses links such as TinyURL, bit.ly, Rebrand.ly, zws.im, 27url.cn, etc.
While the Play Store has removed these apps from the platform, the worrying thing is that despite Google’s protection, the malware keeps coming back again and again. Researchers have found that the malware uses its internal bouncer checks for apps submitted to the Play Store and also performs scanning on the device using Google Play Protect. “Despite public awareness of this particular malware, it continues to find its way into Google’s official application market by tampering with changes to its code, execution method, or payload-restore technology,” the researchers said.
Take special care of these things
To prevent your phone from getting affected by such malware in future, make sure not to download random apps from the Play Store. Users should check the developer name and all other details in the Play Store details before downloading any app on their phone. Before downloading the app, users should first check the user reviews and ratings. As a precaution, users can also download a security tool like Malwarebytes or Sophos Mobile, which quickly scans and removes unwanted malware from the device.
read this also-
Poco F3 GT launched in India, 67W fast charger will be available with the phone, know the price
High Court’s blow to Amazon and Flipkart, petition against antitrust investigation dismissed
.