Android phishing malware can steal your social networking password without giving slightest hints

Google recently removed 85 apps from the Play Store after it was discovered that they were infected with a malware that can steal social-network credentials from the devices of the users.

Must Read

Moving physical data center to cloud: Here’re key non-negotiables for cloud migration

Any journey from a physical data center to the requires careful thought, education and investment in new capabilities to enable migration to the new environment.

Secure your information & data with password managers

There is a lot of personal or business information online. Secure their vulnerability using password managers, and conduct your business in safety

Here’s how live streaming is gaining ground in India

Live Streaming has made it quite easy to watch sports games in real time and that is why it is gaining ground in India
M Kalam
M Kalam
M Kalam covers technology and e-goverance for

Android : Google recently removed 85 apps from the Play Store after it was discovered that they were infected with a malware that can steal social-network credentials from the devices of the users. The most downloaded app out of these 85, was masqueraded as a gaming app having over a million downloads. The app was uploaded on the Play Store in March 2017 without any malicious code. However, after seven months, it got updated with a malicious javascript code that was able to steal login credentials of social media websites, said reports.

Most of these malicious apps were uploaded to the Play Store in October 2017 and were stealing credentials of users (a Russian based social networking site). Besides this, researchers also found several other apps that were published as unofficial clients for the popular messaging app Telegram, uploaded by the same group of malicious hackers.

How did the phishing attack work?

The infected apps used an Official SDK for but injected malicious javascript code in it. This malicious code was capable of stealing users credential from the standard login page of in such a way that the hackers got the passwords and parallelly the user got logged in too, said experts.

These applications looked legitimate and came with an option to authenticate on When a user chose as an option to authenticate, he/she was then asked to enter his/her login credentials. When done, the injected malicious javascript code authenticated the user as well as stole their login credentials making the entire process as normal as it generally is, removing the scope of any suspicion in the mind of the users

“A number of applications come with options where users can login via Facebook, Twitter or Google. While these are convenient for users, in case of malicious applications it is very risky to login via social accounts as they can steal your credentials. It is advised not to use “Login via social media” option until you are not sure of the legitimacy of the application and specifically “Never enter your password in apps”, said Ankush Johar, Director at Infosec Ventures.

Tips to mitigate Android phishing attack

Google recently launched “Google play protect”. Make sure that the application is verified by “Google Play Protect” else avoid downloading the app. Always check what all permission the app requires the users to allow before installation. Stay cautious with permissions that don’t seem legitimate, for instance, if a calculator app wants to access your call logs or messages it is clear that the app wants unnecessary permission and can be malicious. Trust your gut!, said Johar.

Don’t download apps from unknown sources, they can be infected with data-stealing malware hidden behind a genuine looking app. Stay away from pirated apps. Do not enter your confidential detail like your bank account details etc on the downloaded application. For added security, set your app store settings to “Do not allow third-party app downloads from untrusted sites.”

- Advertisement -
- Advertisement -

Latest in TECH

- Advertisement - ESDS eNight Cloud Hosting

Related Articles