Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Backup Passwords Cybersecurity Saving Money Communication Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones AI Mobile Devices Data Recovery communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Information Artificial Intelligence Automation Facebook Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Blockchain Windows 10 Bandwidth Business Technology Virtualization Wi-Fi Two-factor Authentication Mobile Office Vendor Apps Data Security BYOD Mobile Device Management Chrome Managed Services Gmail Voice over Internet Protocol Budget Tip of the week Apple App Employer-Employee Relationship Networking Marketing Office 365 HIPAA Applications Access Control WiFi Conferencing How To Computing BDR Hacker Information Technology Avoiding Downtime Website Analytics Office Tips Virtual Private Network Router Augmented Reality Health Storage Healthcare Password 2FA Bring Your Own Device Help Desk Big Data Retail Managed IT Services Operating System Computers Risk Management Vendor Management Physical Security Display Firewall Printer Paperless Office Infrastructure Remote Workers Windows 11 The Internet of Things Document Management Monitoring Excel Free Resource Social Project Management Windows 7 Scam Going Green Microsoft 365 Data loss Telephone Customer Service Solutions Cybercrime Cooperation Patch Management Save Money Remote Monitoring End of Support Vulnerability Telephone System Virtual Desktop Holidays Data storage IT Management Cost Management LiFi Meetings Data Storage VPN Word Outlook Video Conferencing Managed Services Provider Money Computer Repair Virtual Machines Professional Services Humor User Tip Modem Safety Processor Mobile Security Sports iPhone Mouse Supply Chain Machine Learning Vulnerabilities Administration Smart Technology Saving Time Maintenance Images 101 Antivirus Multi-Factor Authentication Mobility Managed IT Service Customer Relationship Management Settings Printing Downloads Wireless Content Filtering Licensing Hacking YouTube Data Privacy Employees Presentation Integration Entertainment Robot Cryptocurrency Wireless Technology Unified Threat Management Google Wallet Social Networking Vendors Reviews Legislation Medical IT Transportation Recovery Fileless Malware Be Proactive Development Wearable Technology Laptop Workforce Network Congestion Hypervisor Hard Drives Content Windows 8 User Error Health IT Drones Motherboard Threats Shopping Comparison Optimization Domains PowerPoint Employer/Employee Relationships Directions Assessment Permissions Workplace Strategies Point of Sale Halloween Meta PCI DSS Refrigeration Navigation Amazon Gig Economy Specifications Public Speaking Internet Service Provider Lithium-ion battery Teamwork Microchip Network Management Internet Exlporer Tech Support Fraud Scary Stories Outsource IT Regulations Compliance Monitors Evernote Entrepreneur Username Hacks Environment Black Friday Fun Media Memes Net Neutrality SQL Server Database Deep Learning Websites IT Technicians Small Businesses Financial Data History Undo SharePoint Proxy Server Cookies Education Displays Smartwatch Electronic Medical Records Cyber Monday IT Procurement Azure Tactics Hotspot Mirgation Outsourcing Telework Writing Cyber security Tech Lenovo Mobile Computing Nanotechnology CES Virtual Reality Search Communitications Workplace Supply Chain Management Application Server Management Addiction Best Practice Private Cloud Language Identity Theft Chatbots Buisness Hiring/Firing FinTech Term Superfish Management Legal Screen Reader IT solutions Twitter Distributed Denial of Service Paperless IT Assessment IBM Co-managed IT Flexibility Value Service Level Agreement Business Growth Error Computing Infrastructure Identity Technology Care Organization Social Engineering Bookmark Smart Tech Digital Security Cameras Remote Computing Cortana Business Communications Smart Devices Scams Remote Working Memory Download Alt Codes Alerts Tablet Downtime Hybrid Work Data Breach Competition Google Play Browsers Connectivity Hosted Solution Videos Alert Break Fix Human Resources Electronic Health Records Cables Dark Data Wasting Time Managed IT Upload Typing File Sharing Social Network How To Multi-Factor Security Trend Micro Security Cameras User Google Drive IoT Notifications Dark Web Knowledge Google Apps Software as a Service Travel IT Maintenance Managing Costs Trends Techology Customer Resource management Google Maps Regulations Business Intelligence Google Calendar 5G eCommerce SSID IP Address Virtual Assistant Data Analysis Google Docs Star Wars Unified Communications Microsoft Excel Experience Shortcuts Surveillance Unified Threat Management Staff Running Cable Ransmoware Virtual Machine Gamification Bitcoin

Blog Archive