Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Automation Facebook Miscellaneous Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Wi-Fi Business Technology Virtualization Data Security Vendor Mobile Office Two-factor Authentication Apps Budget Apple BYOD App Mobile Device Management Gmail Tip of the week WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Networking How To BDR Hacker Avoiding Downtime HIPAA Marketing Applications Access Control Computing Information Technology Conferencing Office 365 Storage Password Computers Bring Your Own Device Website Router Virtual Private Network 2FA Operating System Health Help Desk Risk Management Big Data Retail Healthcare Office Tips Analytics Augmented Reality Managed IT Services Cooperation Free Resource Project Management Customer Service Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Windows 11 Going Green Display Printer Firewall Paperless Office Cybercrime Infrastructure Excel Monitoring The Internet of Things Document Management Remote Workers Social Telephone Scam Data loss Images 101 Sports Hacking Presentation Telephone System Multi-Factor Authentication Mouse Robot Mobility Cost Management Wireless Technology Administration IT Management VPN Employees Meetings Integration User Tip Word Modem Settings Processor Computer Repair Mobile Security Supply Chain Printing Wireless Content Filtering Holidays YouTube Data Storage Smart Technology Cryptocurrency Safety Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Virtual Desktop Data storage Managed IT Service LiFi Maintenance Downloads Antivirus Data Privacy Outlook iPhone Licensing Money Customer Relationship Management Entertainment Humor Vulnerabilities Alert Hacks Scary Stories Trends Supply Chain Management Shortcuts Competition Managed IT Customer Resource management FinTech Ransmoware File Sharing Regulations Dark Data Google Calendar Term Fun Data Analysis Vendors Star Wars IT Assessment How To Microsoft Excel Deep Learning Notifications Staff Value Gamification Flexibility Be Proactive Organization Workforce Travel Social Networking Legislation Education Techology Fileless Malware Digital Security Cameras Threats User Google Maps Smart Devices Wearable Technology Memory Mobile Computing Content Remote Working Workplace Strategies Health IT Meta Unified Threat Management Motherboard Data Breach Comparison Google Play Search IP Address Unified Threat Management Directions Videos Amazon Assessment Electronic Health Records Permissions Best Practice Wasting Time Buisness Outsource IT Trend Micro Legal Network Congestion Specifications Security Cameras IT solutions User Error Microchip Environment Recovery Internet Exlporer Software as a Service Media Fraud Business Growth Managing Costs Hard Drives Username Domains Small Businesses Point of Sale eCommerce Black Friday SSID Cortana Alt Codes Displays Database Surveillance Virtual Assistant Tech Support IT Technicians Virtual Machine Downtime Refrigeration Network Management Public Speaking Proxy Server Reviews Outsourcing Cookies Monitors Cyber Monday Medical IT Hosted Solution Typing Lithium-ion battery Tactics Development Hotspot Transportation Workplace Entrepreneur Websites Mirgation Hypervisor Knowledge Shopping Hiring/Firing Nanotechnology Optimization Google Drive PowerPoint SharePoint Addiction Paperless Electronic Medical Records Language Employer/Employee Relationships Co-managed IT Chatbots Navigation 5G Undo Management PCI DSS Experience Lenovo Gig Economy Technology Care Screen Reader Google Docs Writing Distributed Denial of Service Unified Communications Bitcoin Running Cable Service Level Agreement Internet Service Provider Business Communications Virtual Reality Computing Infrastructure Teamwork Scams Private Cloud Identity Google Wallet Evernote Server Management Regulations Compliance Superfish Bookmark Hybrid Work Identity Theft Smart Tech Memes Windows 8 Laptop Application Download Net Neutrality Human Resources Twitter Alerts SQL Server Cables Error History Drones Financial Data IBM Browsers Smartwatch Connectivity IT Social Engineering Break Fix Halloween Upload Procurement Google Apps Remote Computing Azure IT Maintenance Cyber security Multi-Factor Security Tech Social Network Telework CES Business Intelligence Tablet IoT Communitications Dark Web

Blog Archive