- I tested Samsung's 98-inch 4K QLED TV, and watching Hollywood movies on it left me in awe
- Apple is working on a doorbell that unlocks your door Face ID-style
- 5 biggest Linux and open-source stories of 2024: From AI arguments to security close calls
- Securing the OT Stage: NIS2, CRA, and IEC62443 Take Center Spotlight
- Trump taps Sriram Krishnan for AI advisor role amid strategic shift in tech policy
Chinese Spyware Discovered on Google Play Store
Two spyware applications posing as file management tools have been discovered on the Google Play Store with a total of at least 1.5 million installs.
The apps, attributed to the same developer and discovered by cybersecurity firm Pradeo, exhibit similar malicious behaviors and operate without user interaction. Their main objective is to covertly extract and transmit sensitive user data to malicious servers based in China. The findings were reported to Google.
One of the spyware applications falsely claimed on its Google Play Store profile that it does not collect user data.
“The reports from our behavioral analysis engine show that both spyware collect very personal data from their targets, to send them to a large number of destinations which are mostly located in China and identified as malicious,” explained Roxane Suau, the Pradeo researcher who uncovered the spyware.
In addition to collecting personal information from users’ devices, such as contact lists and media files (picture, audio and video files), the applications transmit the stolen data to multiple malicious servers predominantly located in China.
Read more on Chinese spyware: CISA: Patch Bug Exploited by Chinese E-commerce App
The volume of data transmitted by the spyware distinguishes it from typical cases. Each application sends the stolen data over a hundred times.
To maximize their success, the hackers behind the spyware employ several tactics. The applications falsely boost their credibility by artificially inflating the number of installations, a technique achieved through install farms or mobile device emulators.
Additionally, the spyware utilizes advanced permissions to induce device restarts, enabling automatic launch and execution upon restart, as well as techniques to make uninstallation harder.
“An application can simply hide its icon from the general view. Both of these malware use this technique to make […] uninstallation harder. To delete them, users require going to the application list in the settings,” Suau explained.
The discovery of this spyware on the Google Play Store serves as a stark reminder for users and organizations to remain vigilant, take appropriate security measures and protect their sensitive information from falling into the wrong hands.