Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Smartphone Data Backup Android Upgrade Smartphones Data Recovery VoIP AI Business Management Mobile Devices Disaster Recovery communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Server Remote Work Managed Service Provider Compliance Outsourced IT Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Virtualization Apps Data Security Vendor Mobile Office Two-factor Authentication Budget Employer-Employee Relationship Apple Networking App BYOD Mobile Device Management Gmail Managed Services Voice over Internet Protocol Tip of the week Chrome How To Hacker BDR Avoiding Downtime HIPAA Marketing Applications Computing Information Technology Access Control Office 365 WiFi Conferencing Retail Storage Password Bring Your Own Device Managed IT Services Computers Router Website Operating System Risk Management Virtual Private Network 2FA Help Desk Health Analytics Office Tips Big Data Augmented Reality Healthcare Cooperation Free Resource Scam Data loss Project Management Windows 7 Customer Service Microsoft 365 Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Firewall Display Printer Monitoring Paperless Office Infrastructure Excel The Internet of Things Remote Workers Document Management Social Telephone iPhone Licensing Maintenance Vulnerabilities Entertainment Antivirus Sports Customer Relationship Management Data Privacy Mouse Images 101 Administration Hacking Telephone System Multi-Factor Authentication Presentation Mobility Cost Management Wireless Technology Robot Employees Settings Integration Wireless Printing Content Filtering User Tip IT Management Modem Word Mobile Security Processor VPN YouTube Meetings Cryptocurrency Holidays Data Storage Computer Repair Smart Technology Supply Chain Video Conferencing Virtual Desktop Safety Data storage LiFi Managed Services Provider Professional Services Saving Time Virtual Machines Outlook Managed IT Service Machine Learning Money Humor Downloads Break Fix Scams Browsers Smartwatch Hacks Server Management Connectivity IT Scary Stories Private Cloud IBM Upload Procurement Identity Theft Azure Hybrid Work Fun Superfish Social Network Telework Deep Learning Cyber security Twitter Multi-Factor Security Tech Human Resources Dark Web Cables CES IoT Communitications Error Trends Supply Chain Management Education Social Engineering Customer Resource management FinTech Regulations Remote Computing Competition Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Mobile Computing Star Wars IT Assessment Gamification Flexibility Tablet Staff Value Business Intelligence Search Organization Best Practice Social Networking Alert Legislation Shortcuts Ransmoware Dark Data User Fileless Malware Digital Security Cameras Managed IT Smart Devices Buisness File Sharing Content Remote Working IT solutions Wearable Technology Memory Vendors How To Legal Health IT Business Growth Motherboard Data Breach Notifications Comparison Google Play Be Proactive Permissions Workforce Directions Videos Assessment Electronic Health Records Travel IP Address Google Maps Wasting Time Threats Cortana Techology Alt Codes Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Recovery Microchip Internet Exlporer Software as a Service Downtime Unified Threat Management Username Hosted Solution Managing Costs Amazon Hard Drives Unified Threat Management Typing eCommerce Domains Black Friday SSID Virtual Assistant Outsource IT Network Congestion Database Surveillance Google Drive User Error IT Technicians Virtual Machine Environment Knowledge Refrigeration Media Proxy Server Reviews Cookies Public Speaking Cyber Monday Medical IT Point of Sale Lithium-ion battery Hotspot Transportation Small Businesses 5G Tactics Development Google Docs Unified Communications Mirgation Hypervisor Displays Experience Entrepreneur Shopping Bitcoin Network Management Nanotechnology Optimization Running Cable Tech Support PowerPoint Addiction Language Employer/Employee Relationships Outsourcing Monitors Google Wallet Management PCI DSS Chatbots Undo Navigation Distributed Denial of Service Workplace Gig Economy Windows 8 Screen Reader Laptop Websites Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Drones SharePoint Regulations Compliance Identity Electronic Medical Records Evernote Paperless Co-managed IT Bookmark Smart Tech Memes Halloween Download Net Neutrality Alerts SQL Server Technology Care Writing Application Lenovo Financial Data History Virtual Reality Business Communications

Blog Archive