Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Backup Quick Tips Passwords Saving Money Cybersecurity Communication Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Remote Work Managed Service Provider Outsourced IT Compliance IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Windows 10 Blockchain Wi-Fi Virtualization Business Technology Bandwidth Vendor Two-factor Authentication Apps Data Security Mobile Office BYOD Gmail Managed Services Voice over Internet Protocol Tip of the week Employer-Employee Relationship Chrome Budget Networking Apple App Mobile Device Management Computing HIPAA Information Technology WiFi Applications Access Control Office 365 Conferencing Hacker Avoiding Downtime How To BDR Marketing Operating System Virtual Private Network Risk Management Router Big Data Healthcare Health Office Tips Analytics Augmented Reality Help Desk Retail 2FA Storage Password Computers Bring Your Own Device Managed IT Services Website Firewall Vendor Management Cybercrime Physical Security Display Printer The Internet of Things Remote Workers Paperless Office Infrastructure Social Monitoring Document Management Free Resource Project Management Windows 7 Windows 11 Customer Service Microsoft 365 Scam Excel Data loss Solutions Telephone Cooperation Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Content Filtering Data Privacy Telephone System Data Storage Cost Management IT Management VPN Meetings Video Conferencing YouTube Managed Services Provider Cryptocurrency Safety Virtual Machines Professional Services Computer Repair Virtual Desktop User Tip Modem Data storage LiFi Mobile Security Processor iPhone Outlook Machine Learning Vulnerabilities Money Customer Relationship Management Humor Smart Technology Images 101 Multi-Factor Authentication Saving Time Mobility Maintenance Sports Hacking Supply Chain Antivirus Mouse Presentation Managed IT Service Downloads Administration Wireless Technology Employees Licensing Integration Entertainment Robot Word Holidays Settings Printing Wireless Hypervisor Unified Threat Management Social Networking Legislation Hosted Solution Public Speaking Shopping Typing Lithium-ion battery Optimization Fileless Malware PowerPoint Google Apps Content Wearable Technology Network Congestion Employer/Employee Relationships Entrepreneur IT Maintenance Knowledge Business Intelligence Health IT User Error Navigation Motherboard Google Drive Comparison PCI DSS Permissions Gig Economy Directions Shortcuts Assessment Ransmoware Point of Sale Internet Service Provider Undo Teamwork 5G Experience Vendors Evernote Google Docs Specifications Regulations Compliance Unified Communications Fraud Tech Support Bitcoin Memes Running Cable Microchip Be Proactive Internet Exlporer Network Management Workforce Username Google Wallet Monitors Net Neutrality SQL Server History Threats Black Friday Financial Data Websites Smartwatch Windows 8 IT Laptop Application Workplace Strategies Database Meta IT Technicians Drones Procurement Azure IBM Cyber security Amazon Proxy Server SharePoint Tech Cookies Cyber Monday Electronic Medical Records Telework Hotspot CES Communitications Halloween Tactics Outsource IT Lenovo Mirgation Writing Supply Chain Management Environment Term Media Nanotechnology Virtual Reality FinTech Language Private Cloud Hacks IT Assessment Scary Stories Addiction Server Management Fun Small Businesses Management Superfish Chatbots Identity Theft Flexibility Competition Value Organization Deep Learning Displays Screen Reader Distributed Denial of Service Twitter Computing Infrastructure Error Digital Security Cameras Smart Devices Service Level Agreement Memory Outsourcing Identity Social Engineering Remote Working Education Data Breach User Bookmark Google Play Smart Tech Remote Computing Alerts Videos Mobile Computing Electronic Health Records Workplace Download Wasting Time Search Hiring/Firing Tablet Best Practice IP Address Trend Micro Browsers Security Cameras Paperless Connectivity Break Fix Alert File Sharing Dark Data Software as a Service Buisness Co-managed IT Upload Managed IT Managing Costs Technology Care Social Network Legal Multi-Factor Security How To IT solutions Business Growth eCommerce Recovery SSID Business Communications IoT Dark Web Notifications Travel Surveillance Hard Drives Virtual Assistant Scams Trends Virtual Machine Cortana Hybrid Work Customer Resource management Techology Regulations Google Maps Google Calendar Domains Reviews Alt Codes Data Analysis Medical IT Human Resources Star Wars Microsoft Excel Staff Unified Threat Management Development Downtime Refrigeration Transportation Cables Gamification

Blog Archive