Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Automation Information Facebook Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Server Managed Service Provider Remote Work Compliance Outsourced IT Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Blockchain Windows 10 Virtualization Wi-Fi Mobile Office Vendor Data Security Apps Two-factor Authentication Chrome Tip of the week Budget Mobile Device Management Apple Gmail Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Avoiding Downtime Marketing HIPAA How To Applications WiFi BDR Computing Information Technology Conferencing Office 365 Hacker Access Control Augmented Reality Website Storage Password Bring Your Own Device Retail Router Managed IT Services Big Data Operating System Help Desk Healthcare 2FA Risk Management Virtual Private Network Computers Analytics Office Tips Health Solutions Cooperation Document Management Firewall Scam Data loss The Internet of Things Going Green Social Patch Management Save Money Remote Workers Cybercrime Windows 11 Monitoring Remote Monitoring End of Support Vulnerability Vendor Management Physical Security Excel Customer Service Free Resource Display Project Management Printer Windows 7 Telephone Paperless Office Microsoft 365 Infrastructure Money Humor Entertainment Machine Learning Data Privacy Employees Integration Word Sports Mouse Telephone System Cost Management Maintenance Administration Antivirus Holidays Data Storage Safety Video Conferencing Modem Managed Services Provider User Tip Processor Professional Services Mobile Security Settings Virtual Machines Wireless Printing Robot Content Filtering YouTube Smart Technology iPhone Cryptocurrency Supply Chain Customer Relationship Management IT Management Meetings Saving Time VPN Vulnerabilities Virtual Desktop Data storage Managed IT Service LiFi Hacking Presentation Computer Repair Images 101 Downloads Mobility Outlook Multi-Factor Authentication Wireless Technology Licensing Websites Multi-Factor Security Scams Remote Working IP Address Memory Social Network Google Play IoT Dark Web Hybrid Work Data Breach Human Resources Electronic Health Records SharePoint Trends Hacks Electronic Medical Records Videos Scary Stories Google Calendar Cables Fun Wasting Time Customer Resource management Recovery Regulations Data Analysis Hard Drives Lenovo Security Cameras Star Wars Microsoft Excel Deep Learning Writing Trend Micro Google Apps Software as a Service Domains Gamification Staff Virtual Reality Social Networking Private Cloud Legislation Education IT Maintenance Managing Costs Server Management Fileless Malware Refrigeration Superfish SSID Identity Theft Business Intelligence eCommerce Shortcuts Surveillance Public Speaking Virtual Assistant Content Wearable Technology Mobile Computing Twitter Motherboard Error Comparison Ransmoware Search Lithium-ion battery Virtual Machine Health IT Directions Medical IT Assessment Entrepreneur Permissions Best Practice Vendors Social Engineering Reviews Buisness Be Proactive Development Transportation Remote Computing Legal Specifications IT solutions Workforce Hypervisor Microchip Undo PowerPoint Internet Exlporer Tablet Fraud Business Growth Threats Shopping Optimization Workplace Strategies Employer/Employee Relationships Username Alert File Sharing Black Friday Meta Dark Data PCI DSS Cortana Managed IT Navigation Database Alt Codes Amazon How To Gig Economy Downtime Internet Service Provider Teamwork IT Technicians Notifications Cookies Travel Cyber Monday Hosted Solution Outsource IT Regulations Compliance Proxy Server Application Evernote Techology Tactics Google Maps Hotspot Typing Environment Media Memes Net Neutrality IBM SQL Server Mirgation Nanotechnology Google Drive Unified Threat Management Small Businesses Financial Data Knowledge History IT Unified Threat Management Addiction Language Displays Smartwatch Procurement 5G Azure Management Chatbots Tech Screen Reader Google Docs Distributed Denial of Service Unified Communications Outsourcing Network Congestion Telework Experience Cyber security Communitications Competition User Error Service Level Agreement Computing Infrastructure Bitcoin CES Running Cable Workplace Supply Chain Management Identity Google Wallet Term Smart Tech Point of Sale Hiring/Firing FinTech Bookmark IT Assessment Download Alerts Windows 8 Laptop Paperless Tech Support Co-managed IT Flexibility Value User Network Management Drones Connectivity Break Fix Technology Care Monitors Organization Browsers Business Communications Smart Devices Upload Digital Security Cameras Halloween

Blog Archive