Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Data Backup Smartphone Managed Service Android Upgrade Business Management VoIP Smartphones communications Data Recovery AI Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Information Training Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Server Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship IT Support Compliance Encryption Spam Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Two-factor Authentication Mobile Office Data Security Vendor Apps Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Chrome Gmail Networking Budget Apple BYOD App Employer-Employee Relationship Computing Hacker Access Control Information Technology Avoiding Downtime Marketing Conferencing Office 365 How To BDR WiFi HIPAA Applications Operating System Computers Health Risk Management Help Desk Website Retail Analytics Office Tips Healthcare Augmented Reality Managed IT Services Storage Password Bring Your Own Device Big Data Router 2FA Virtual Private Network Customer Service Printer Excel Cybercrime Paperless Office Infrastructure Monitoring Document Management Remote Workers Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Remote Monitoring Social Vulnerability End of Support Vendor Management Solutions Windows 11 Going Green Physical Security Display Computer Repair Mobile Security Content Filtering Processor Hacking YouTube Holidays Presentation Data Storage Cryptocurrency Wireless Technology Smart Technology Video Conferencing Machine Learning Managed Services Provider Professional Services Virtual Desktop Saving Time Virtual Machines Data storage LiFi Managed IT Service Word Data Privacy Maintenance Outlook Antivirus Downloads iPhone Money Humor Licensing Vulnerabilities Entertainment Safety Sports Images 101 Mouse Telephone System Multi-Factor Authentication Robot Mobility Administration Cost Management IT Management VPN Employees Meetings Customer Relationship Management Integration Settings Wireless User Tip Supply Chain Modem Printing Virtual Assistant Hosted Solution Outsourcing Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Typing Proxy Server Reviews Workplace Cookies Monitors Cyber Monday Medical IT Google Drive Hotspot Transportation User Knowledge Hiring/Firing Tactics Development Paperless Websites Mirgation Hypervisor 5G Shopping Co-managed IT Nanotechnology Optimization PowerPoint Technology Care Addiction IP Address Google Docs Electronic Medical Records Language Employer/Employee Relationships Unified Communications Experience SharePoint Management PCI DSS Business Communications Chatbots Bitcoin Navigation Running Cable Writing Distributed Denial of Service Lenovo Gig Economy Scams Screen Reader Google Wallet Hybrid Work Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Recovery Server Management Regulations Compliance Human Resources Private Cloud Identity Hard Drives Windows 8 Evernote Laptop Superfish Bookmark Cables Identity Theft Smart Tech Memes Domains Drones Download Net Neutrality Twitter Alerts SQL Server Financial Data Google Apps Error History Refrigeration Halloween Social Engineering Break Fix Browsers Smartwatch IT Maintenance Connectivity IT Public Speaking Business Intelligence Upload Procurement Lithium-ion battery Remote Computing Azure Social Network Telework Shortcuts Cyber security Hacks Multi-Factor Security Tech Entrepreneur Scary Stories Dark Web Fun CES Ransmoware Tablet IoT Communitications Vendors Trends Supply Chain Management Alert Deep Learning Managed IT Customer Resource management FinTech Be Proactive File Sharing Regulations Undo Dark Data Google Calendar Term How To Microsoft Excel Education Data Analysis Workforce Star Wars IT Assessment Threats Gamification Flexibility Notifications Staff Value Organization Workplace Strategies Travel Social Networking Mobile Computing Legislation Search Techology Fileless Malware Digital Security Cameras Meta Google Maps Smart Devices Amazon Content Remote Working Wearable Technology Memory Application Best Practice Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Buisness Legal Permissions IT solutions Unified Threat Management Directions Videos Outsource IT Assessment Electronic Health Records IBM Environment Media Wasting Time Business Growth Trend Micro Network Congestion Specifications Security Cameras Fraud Cortana User Error Microchip Small Businesses Internet Exlporer Software as a Service Displays Username Managing Costs Alt Codes Downtime Point of Sale eCommerce Competition Black Friday SSID

Blog Archive