Malicious Loan App "RapiPlata" Infects Over 150,000 Devices on iOS and Android

A fraudulent loan application posing as a legitimate financial service has infected more than 150,000 devices running iOS and Android before being removed from official app stores.
The app, known as “RapiPlata,” reached a Top 20 ranking in the finance category on SimilarWeb’s platform in Colombia, highlighting the extensive reach of this sophisticated threat.
Approximately 100,000 victims downloaded the app from Google Play, while the remainder obtained it from the Apple App Store, revealing vulnerabilities in the security screening processes of both platforms.
Marketed as a quick loan service targeting Colombian users, RapiPlata concealed extensive data theft capabilities behind its seemingly legitimate interface. Once installed, the app requested permissions far exceeding what would be necessary for loan processing, including access to SMS messages, call logs, calendar events, and lists of installed applications.


The app claimed these permissions were essential for assessing creditworthiness and sending payment reminders, but in reality, they enabled comprehensive surveillance of users’ devices.
Check Point researchers identified the malicious app in February 2025 using their Harmony Mobile detection engines, which flagged it as malicious through advanced machine learning models. Their analysis revealed that RapiPlata is part of a larger SpyLoan malware operation linked to previously identified threats. Alarmingly, the app had minimal detection coverage on VirusTotal, allowing it to operate undetected for months before its removal.
Victims reported severe repercussions beyond data theft, including harassment through messages and emails. Attackers frequently threatened users with being labeled as delinquent debtors, even though many had never taken out any loans. In some instances, the app operators contacted victims’ contacts from stolen address books, falsely claiming outstanding debts and damaging personal reputations.
These social engineering tactics compounded the technical exploitation, resulting in both digital and real-world consequences for affected users.


Despite its removal from official stores in March 2025, RapiPlata continues to pose threats through alternative distribution channels. The application’s website remains active and deceptively displays a Google Play download button that redirects users to external sites for unauthorized app installation.
This redirect chain (using URLs like https[:]//t[.]copii[.]co/9YEPe) demonstrates the operators’ determination to sustain their malicious campaign despite increased scrutiny.
The app’s most sophisticated feature was its comprehensive data exfiltration mechanism. Upon first launch, RapiPlata scanned all SMS messages for specific keywords, ostensibly to evaluate financial standing. However, the keyword list revealed broader surveillance intentions, including mundane Spanish terms like “día” (day), “hasta” (until), “para” (for), and “sido” (been), which have minimal financial relevance.
This extensive scanning effectively captured nearly all communications, which were then uploaded to command-and-control servers for analysis and exploitation.
Calendar exfiltration proved particularly dangerous for corporate users, as it often contained Zoom meeting links and presentation attachments. Attackers could leverage this intelligence to join sensitive corporate discussions undetected, accessing intellectual property and strategic business information.
Similarly, call logs enabled mapping of social and professional relationships, facilitating targeted spear-phishing campaigns against contacts in the victim’s network.
- Other (43)
- Ransomware (153)
- Events and News (27)
- Features (45)
- Security (482)
- Tips (79)
- Google (25)
- Achievements (11)
- Products (35)
- Activation (7)
- Dealers (1)
- Bank Phishing (48)
- Malware Alerts (223)
- Cyber Attack (280)
- Data Backup (13)
- Data Breach (113)
- Phishing (162)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (69)
- Android Security (71)
- Knoweldgebase (38)
- Botnet (16)
- Updates (4)
- Alert (71)
- Hacking (61)
- Social Media (8)
- vulnerability (65)
- Hacker (34)
- Spyware (11)
- Windows (7)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (3)
- Website hacks (7)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (8)
- Mozilla (2)
- COVID-19 (5)
- Instagram (3)
- NPAV Announcement (9)
- IoT Security (1)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (5)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (2)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (20)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (9)