Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Facebook Information Artificial Intelligence Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Blockchain Virtualization Bandwidth Mobile Office Two-factor Authentication Vendor Apps Data Security BYOD Mobile Device Management Gmail Tip of the week Chrome Budget Networking Employer-Employee Relationship Apple Managed Services App Voice over Internet Protocol Conferencing Avoiding Downtime Computing Marketing Information Technology Access Control Office 365 HIPAA WiFi Applications How To BDR Hacker Operating System Website Virtual Private Network Risk Management Health 2FA Analytics Office Tips Augmented Reality Retail Router Big Data Storage Password Bring Your Own Device Managed IT Services Help Desk Computers Healthcare Vendor Management Telephone Physical Security Cybercrime Free Resource Project Management Display Printer Windows 7 Paperless Office Cooperation Infrastructure Microsoft 365 Windows 11 Firewall Solutions Document Management Excel The Internet of Things Scam Social Data loss Monitoring Customer Service Patch Management Remote Workers Save Money Remote Monitoring Going Green End of Support Vulnerability Settings iPhone Managed IT Service Wireless Technology Wireless IT Management Printing VPN Meetings Content Filtering Downloads Vulnerabilities YouTube Licensing Images 101 Cryptocurrency Computer Repair Word Entertainment Multi-Factor Authentication Mobility Virtual Desktop Data storage LiFi Telephone System Machine Learning Supply Chain Cost Management Outlook Employees Safety Integration Money Humor Maintenance Antivirus Holidays User Tip Modem Sports Data Storage Mobile Security Processor Mouse Video Conferencing Customer Relationship Management Administration Managed Services Provider Data Privacy Virtual Machines Professional Services Smart Technology Robot Hacking Presentation Saving Time Unified Threat Management Smartwatch Vendors Identity Alt Codes IT Be Proactive Downtime Azure Bookmark Smart Tech Procurement Download Telework Workforce Alerts IP Address Hosted Solution Cyber security Network Congestion Tech User Error CES Threats Typing Communitications Workplace Strategies Break Fix Browsers Connectivity Supply Chain Management Upload Google Drive FinTech Point of Sale Meta Recovery Knowledge Term Social Network Amazon IT Assessment Multi-Factor Security Hard Drives Tech Support Dark Web Domains Value 5G Network Management IoT Flexibility Trends Google Docs Organization Outsource IT Unified Communications Monitors Experience Customer Resource management Digital Security Cameras Environment Regulations Bitcoin Smart Devices Media Google Calendar Refrigeration Running Cable Remote Working Websites Microsoft Excel Public Speaking Memory Data Analysis Star Wars Google Wallet Gamification Small Businesses Staff Lithium-ion battery Data Breach Google Play Entrepreneur SharePoint Videos Displays Social Networking Windows 8 Electronic Health Records Electronic Medical Records Legislation Laptop Wasting Time Fileless Malware Drones Lenovo Content Outsourcing Wearable Technology Trend Micro Writing Security Cameras Health IT Motherboard Software as a Service Virtual Reality Comparison Undo Halloween Private Cloud Workplace Permissions Managing Costs Directions Server Management Assessment Superfish Identity Theft Hiring/Firing eCommerce SSID Virtual Assistant Hacks Surveillance Twitter Paperless Specifications Scary Stories Error Co-managed IT Fraud Virtual Machine Fun Microchip Internet Exlporer Username Reviews Technology Care Deep Learning Social Engineering Application Medical IT Transportation Development Remote Computing Business Communications Black Friday Scams IBM Education Hypervisor Database Shopping Tablet Hybrid Work IT Technicians Optimization PowerPoint Employer/Employee Relationships Proxy Server Cookies Mobile Computing Alert Human Resources Cyber Monday PCI DSS File Sharing Cables Hotspot Dark Data Search Navigation Managed IT Tactics Gig Economy Mirgation Best Practice How To Buisness Teamwork Nanotechnology Internet Service Provider Notifications Google Apps Competition Addiction Legal Regulations Compliance Travel IT Maintenance Language IT solutions Evernote Techology Management Google Maps Business Intelligence Chatbots Business Growth Memes Shortcuts Distributed Denial of Service SQL Server Screen Reader Net Neutrality Service Level Agreement Financial Data Unified Threat Management Ransmoware Computing Infrastructure History User Cortana

Blog Archive