Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Computer Email Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Mobile Office Two-factor Authentication Apple Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship App BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi How To BDR Hacker HIPAA Computing Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing Bring Your Own Device Big Data Managed IT Services Healthcare Computers Operating System Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail 2FA Storage Password Scam Excel Data loss Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Customer Service Vulnerability End of Support Vendor Management Free Resource Cybercrime Project Management Windows 7 Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Monitoring Firewall Document Management Windows 11 The Internet of Things Telephone Mouse Video Conferencing Licensing Managed Services Provider Virtual Machines Professional Services Entertainment Administration Customer Relationship Management Telephone System Robot iPhone Cost Management Settings Vulnerabilities Printing Hacking Wireless Content Filtering Data Privacy Presentation IT Management VPN Images 101 YouTube Meetings Wireless Technology Cryptocurrency Multi-Factor Authentication Mobility User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Word Data storage LiFi Employees Integration Smart Technology Outlook Machine Learning Money Saving Time Humor Safety Holidays Managed IT Service Data Storage Maintenance Antivirus Sports Downloads Supply Chain Employer/Employee Relationships Outsourcing Browsers Education Connectivity Social Engineering Break Fix PCI DSS Remote Computing Navigation Upload Mobile Computing Social Network Gig Economy Application Multi-Factor Security Workplace Teamwork Hiring/Firing Tablet IoT Internet Service Provider Search Dark Web IBM Regulations Compliance Alert Evernote Paperless Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Memes Dark Data Google Calendar Co-managed IT SQL Server Technology Care Legal Data Analysis IT solutions Star Wars Net Neutrality How To Microsoft Excel Business Growth Gamification Financial Data Notifications Staff History Business Communications Smartwatch Travel Social Networking IT Legislation Scams Procurement Cortana Azure Hybrid Work Techology Fileless Malware Google Maps Competition Alt Codes Content Telework Wearable Technology Cyber security Tech Human Resources Cables Health IT CES Downtime Unified Threat Management Motherboard Communitications Comparison Supply Chain Management Permissions Unified Threat Management Directions Hosted Solution Assessment Typing FinTech User Term Google Apps IT Maintenance IT Assessment Network Congestion Specifications Flexibility Knowledge Fraud Value Business Intelligence Google Drive User Error Microchip Internet Exlporer Username IP Address Organization Shortcuts Ransmoware Digital Security Cameras Point of Sale Smart Devices 5G Black Friday Remote Working Experience Memory Vendors Google Docs Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians Recovery Data Breach Google Play Be Proactive Workforce Google Wallet Proxy Server Videos Cookies Hard Drives Electronic Health Records Monitors Cyber Monday Hotspot Wasting Time Threats Tactics Domains Windows 8 Laptop Websites Mirgation Trend Micro Security Cameras Workplace Strategies Meta Drones Nanotechnology Refrigeration Software as a Service Electronic Medical Records Language Managing Costs Amazon SharePoint Addiction Public Speaking Management Lithium-ion battery Halloween Chatbots eCommerce SSID Virtual Assistant Outsource IT Lenovo Screen Reader Surveillance Writing Distributed Denial of Service Entrepreneur Virtual Reality Computing Infrastructure Virtual Machine Environment Media Service Level Agreement Hacks Server Management Reviews Scary Stories Private Cloud Identity Medical IT Transportation Small Businesses Superfish Bookmark Identity Theft Smart Tech Undo Development Fun Twitter Alerts Hypervisor Displays Deep Learning Download Shopping Error Optimization PowerPoint

Blog Archive