Categories: Blog

Researchers discover 280 Android apps that are desperately after your funds


McAfee’s Mobile Research Team has discovered 280 Android apps that come across as legitimate but are covertly trying to gain access to people’s cryptocurrency wallets.

Cybercriminals have created Android malware which is delivered through harmless-looking apps. McAfee has not published the names of the apps but has revealed that they fall into various categories, including government services, banking and utilities.

The malware primarily aims to obtain the mnemonic phrase, also known as the mnemonic recovery phrase or seed word, for your cryptocurrency wallet. The phrase, which is typically 12, 18, or 24 words, is all that a cybercriminal needs to access your digital assets.

As Beeping Computer notes, since recovery phrases are not necessarily easy to remember, people often take screenshots of their recovery phrases and save them in their galleries.

The malware takes advantage of that by sending all the images stored on a victim’s device to the attackers’ server. Optical character recognition (OCR) techniques are then used to convert the images to text.

How’s the malware spread?

The phony apps are not hosted on Google Play. Instead, the links to download are advertised through text messages or social media. Deceptive techniques are often used to trick you into thinking that the link was sent by a reliable source, such as an organization you know or a friend.

When you click on the link, you are taken to a website that looks authentic. After an app is downloaded, it asks for permission to access sensitive information such as your contacts, text messages, and storage, and to stay active in the background. You are given the impression that the permissions are crucial to the functioning of the app.

In addition to covertly stealing your pictures, the apps are also capable of lifting your contacts so that the download link may then be sent to them. The apps also intercept your text messages, giving them the capability to steal two-factor authentication codes.

This malware campaign is primarily targeting users based in Korea but it has recently started to spread to the UK as well. Researchers also found evidence that suggests that the attackers are developing malware for iOS as well.

It’s always best to only downloads Android apps from Google Play. If you recall downloading an app from a third-party source, you might consider deleting it, especially if you have observed odd behaviour such as unexpected redirects or too many loading screens. As an extra step, you should also run a Google Play Protect scan to purge your phone of any malware.


👇Follow more 👇
👉 bdphone.com
👉 ultraactivation.com
👉 trainingreferral.com
👉 shaplafood.com
👉 bangladeshi.help
👉 www.forexdhaka.com
👉 uncommunication.com
👉 ultra-sim.com
👉 forexdhaka.com
👉 ultrafxfund.com
👉 ultractivation.com
👉 bdphoneonline.com

Ultra Activation

Share
Published by
Ultra Activation

Recent Posts

Samsung’s Good Lock is going global with a fresh redesign in One UI 7

What you need to knowSamsung is redesigning Good Lock, the company's first-party launcher known for…

5 hours ago

Android Auto rolls into the Polestar 2 to cover some gaps in Android Automotive

What you need to knowThe latest software update for Polestar 2, P3.3.16, brings cool upgrades…

1 day ago

LineageOS 22.1, based on Android 15, is already available for over 100 devices

What you need to knowLineageOS 22.1 is here for over 100 devices, based on Android…

2 days ago

Samsung’s Galaxy S25 series could borrow this safety feature from Apple and Google

What you need to knowSamsung appears to be including a crash detection virtual sensor on…

3 days ago

What we expect from Android & Wear OS smartwatches in 2025

Happy holidays to all my fellow Wear OS watch owners and a preemptive happy new…

4 days ago

How to create AI-generated images on a Motorola phone with Magic Canvas

In the age of AI, being able to generate images from your phone is becoming…

5 days ago