Google play store security evaded once again by "JOKER" malware
Joker was found again in some of the applications present in the Google play store.
Spyware infected apps were put in the Google play store by Joker malware as it managed to evade the security features used by the store. Android applications infected with Joker malware, a spyware and premium dialer tool known as Bread, were originally designed to perform SMS fraud.
The new version of Joker found in the play store uses an all new method to trick its targets. This new method used by the android trojan is known as toll fraud which is used to trick their victims into subscribing or buying various types of content via their mobile phone bill.
Joker is now more lethal than ever before as this time it has no connection requirement to a command and control server for downloading malicious files and codes. Joker hides malicious codes and files in the application which user downloads from the play store and falls right into its trap.
Researchers have stated that the security features used by Google is not enough to stop Joker, as numerous cases of Joker uploads to the play store were found on a weekly basis.
NPAV recommends users to immediately uninstall any application can is not from a trusted source or can be infected. Users should also check their mobile and card bills for any new subscriptions and keep monitoring for the same.
Install NPAV mobile application to protect your android devices from all kinds of cyber attacks. Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (123)
- Events and News (26)
- Features (44)
- Security (422)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (187)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (4)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)