Hackers using hidden apps to access smartphones, cybersecurity experts warn

&Tab;&Tab;<div class&equals;"wpcnt">&NewLine;&Tab;&Tab;&Tab;<div class&equals;"wpa">&NewLine;&Tab;&Tab;&Tab;&Tab;<span class&equals;"wpa-about">Advertisements<&sol;span>&NewLine;&Tab;&Tab;&Tab;&Tab;<div class&equals;"u top&lowbar;amp">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;<amp-ad width&equals;"300" height&equals;"265"&NewLine;&Tab;&Tab; type&equals;"pubmine"&NewLine;&Tab;&Tab; data-siteid&equals;"111265417"&NewLine;&Tab;&Tab; data-section&equals;"2">&NewLine;&Tab;&Tab;<&sol;amp-ad>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;<&sol;div><p>Hackers are increasingly using hidden apps to target mobile phone users&comma; cybersecurity experts have warned&period;<&sol;p>&NewLine;<p>Researchers from cybersecurity firm McAfee have published their latest Mobile Threat Report&comma; which warns of the rise of hidden app attacks and their ability to access user data&period;<&sol;p>&NewLine;<p><&excl;--Ads1--><&sol;p>&NewLine;<p>According to the annual study&comma; phone users are being targeted by malicious apps which disguise themselves as popular downloads before hiding their icon&comma; making them and the malware they contain harder to remove&period;<&sol;p>&NewLine;<p>The research said hidden app attacks made up around 50&percnt; of malicious activity in 2019&comma; an increase of 30&percnt; on the year before&period;<&sol;p>&NewLine;<p>McAfee fellow and chief scientist Raj Samani said&colon; &OpenCurlyDoubleQuote;There exists a growing trend for many apps to remain hidden&comma; stealing precious resources and important data from the device that acts as the remote control to consumers’ digital world&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Now more than ever&comma; it is critical consumers make themselves aware of modern threats and the steps they can take to defend themselves against them&comma; such as staying on legitimate app stores and reading reviews carefully&period;”<&sol;p>&NewLine;<p>McAfee’s report said some hackers use hidden apps to install advertising malware on smartphones&comma; which fraudulently increases advertising revenue by redirecting users to different ad types and topics in a way that hides the infection&period;<&sol;p>&NewLine;<p><&excl;--Ads2--><&sol;p>&NewLine;<p>The research found one app pretending to be the game Call Of Duty and another pretending to be photo-editing tool FaceApp which could be found in links in YouTube videos and other search results from people looking for free or &OpenCurlyDoubleQuote;cracked” apps outside official stores&period;<&sol;p>&NewLine;<p>McAfee’s researchers said once these apps were installed on a device&comma; their icons changed to mimic the Settings app&comma; but when tapped to open they would display an error message and tell users to tap OK to uninstall&period;<&sol;p>&NewLine;<p>Following these steps would instead complete the installation and also hide the fake Settings icon&comma; making the app harder to find to remove it and the malware&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;The objective of these hidden apps is relatively straightforward&colon; generate money for the developer&comma;” Mr Samani said&period;<&sol;p>&NewLine;<p>The report urges mobile phone users to only download apps and other content from official app stores&comma; keep their software up to date and monitor their digital IDs to stay aware of any changes or actions they did not make&period; Any changes can be a sign a device or account has been compromised&period;<&sol;p>&NewLine;<p><&excl;--Ads3--><&sol;p>&NewLine;<p>Terry Hicks&comma; executive vice president of the consumer business group at McAfee&comma; said the firm hoped its latest report would help make smartphone users more aware of cybersecurity dangers&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Consumers are connected more than ever&comma; and as we look at the current security landscape&comma; as well as future risks&comma; we want to make sure we are doing everything to help consumers protect what matters more to them – their personal data&comma; as well as their family and friends&comma;” he said&period;<&sol;p>&NewLine;<p>&OpenCurlyDoubleQuote;Mobile threats are playing a game of hide and steal&comma; and we will continue to empower consumers to safeguard their most valued assets and data&period;”<&sol;p>&NewLine;&Tab;&Tab;&Tab;<div style&equals;"padding-bottom&colon;15px&semi;" class&equals;"wordads-tag" data-slot-type&equals;"belowpost">&NewLine;&Tab;&Tab;&Tab;&Tab;<div id&equals;"atatags-dynamic-belowpost-68ed1232c6ff1">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<script type&equals;"text&sol;javascript">&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback &equals; function &lpar;&rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; false &equals;&equals;&equals; &lpar; window&period;isWatlV1 &quest;&quest; false &rpar; &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&sol;&sol; Use Aditude scripts&period;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings &equals; window&period;tudeMappings &vert;&vert; &lbrack;&rsqb;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;tudeMappings&period;push&lpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;divId&colon; 'atatags-dynamic-belowpost-68ed1232c6ff1'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;format&colon; 'belowpost'&comma;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;if &lpar; document&period;readyState &equals;&equals;&equals; 'loading' &rpar; &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;document&period;addEventListener&lpar; 'DOMContentLoaded'&comma; window&period;getAdSnippetCallback &rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub; else &lbrace;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;window&period;getAdSnippetCallback&lpar;&rpar;&semi;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;&Tab;&rcub;&NewLine;&Tab;&Tab;&Tab;&Tab;&Tab;<&sol;script>&NewLine;&Tab;&Tab;&Tab;&Tab;<&sol;div>&NewLine;&Tab;&Tab;&Tab;<&sol;div>


Discover more from London Glossy Post

Subscribe to get the latest posts sent to your email.

- Advertisement -
Exit mobile version