Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Email Workplace Tips Privacy Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service AI Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Automation Artificial Intelligence Holiday Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server IT Support Managed Service Provider Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Virtualization Business Technology Wi-Fi Blockchain Bandwidth Windows 10 Apps Managed Services Two-factor Authentication Data Security Mobile Office Vendor Apple WiFi App Tip of the week Employer-Employee Relationship Voice over Internet Protocol Networking Chrome Mobile Device Management BYOD Budget Gmail Access Control Conferencing Computing Information Technology Hacker Managed IT Services How To BDR Avoiding Downtime Office 365 Marketing HIPAA Physical Security Password Applications Health Help Desk Big Data 2FA Operating System Retail Risk Management Healthcare Computers Analytics Website Office Tips Augmented Reality Storage Router Virtual Private Network Bring Your Own Device Printer The Internet of Things Paperless Office Infrastructure Windows 11 Monitoring Social Going Green Document Management Excel Cybercrime Managed IT Service Telephone Remote Workers Scam Customer Service Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Remote Monitoring Microsoft 365 Vulnerability End of Support Vendor Management Solutions Firewall Display Computer Repair Mobile Security Processor Safety Administration Holidays Smart Technology Data Storage Supply Chain Machine Learning Video Conferencing Saving Time Settings Wireless Managed Services Provider Printing Professional Services Content Filtering Virtual Machines Customer Relationship Management YouTube Maintenance Antivirus Downloads Cryptocurrency Hacking Licensing iPhone Presentation Entertainment Virtual Desktop Data storage Vulnerabilities LiFi Wireless Technology Data Privacy Outlook Telephone System Images 101 Robot Cost Management Multi-Factor Authentication Money Mobility Humor Word IT Management VPN Meetings Sports Employees Mouse Integration User Tip Modem Managing Costs Amazon Mobile Computing Database SSID Network Management Undo Tech Support IT Technicians Search eCommerce Surveillance Virtual Assistant Outsource IT Proxy Server Best Practice Cookies Monitors Cyber Monday Hotspot Virtual Machine Environment Media Tactics Buisness Legal Medical IT IT solutions Websites Mirgation Reviews Development Transportation Small Businesses Business Growth Nanotechnology Application Electronic Medical Records Language Hypervisor Displays SharePoint Addiction PowerPoint Management Chatbots Cortana Shopping Optimization Employer/Employee Relationships Outsourcing Lenovo Alt Codes IBM Screen Reader Writing Distributed Denial of Service Downtime Virtual Reality Computing Infrastructure PCI DSS Navigation Service Level Agreement Workplace Server Management Hosted Solution Private Cloud Identity Gig Economy Internet Service Provider Teamwork Hiring/Firing Superfish Bookmark Typing Identity Theft Smart Tech Twitter Alerts Regulations Compliance Evernote Paperless Download Google Drive Co-managed IT Competition Error Knowledge Memes Net Neutrality SQL Server Technology Care Browsers Connectivity Social Engineering Break Fix Remote Computing 5G Financial Data History Business Communications Upload Google Docs Scams Social Network Unified Communications Experience Smartwatch Multi-Factor Security IT Procurement Azure Hybrid Work Bitcoin Tablet IoT Running Cable User Dark Web Trends Alert Telework Cyber security Google Wallet Tech Human Resources Cables Managed IT Customer Resource management File Sharing Regulations CES Dark Data Google Calendar Communitications How To Microsoft Excel Supply Chain Management Data Analysis Windows 8 IP Address Star Wars Laptop Gamification Notifications Staff FinTech Drones Term Google Apps IT Maintenance Travel Social Networking Legislation IT Assessment Flexibility Value Business Intelligence Techology Fileless Malware Google Maps Halloween Recovery Content Hard Drives Wearable Technology Organization Shortcuts Ransmoware Health IT Domains Unified Threat Management Motherboard Digital Security Cameras Comparison Smart Devices Permissions Remote Working Memory Vendors Unified Threat Management Directions Hacks Assessment Scary Stories Refrigeration Fun Data Breach Google Play Be Proactive Electronic Health Records Workforce Deep Learning Public Speaking Videos Network Congestion Specifications Fraud Wasting Time Threats User Error Microchip Lithium-ion battery Internet Exlporer Security Cameras Workplace Strategies Username Education Entrepreneur Trend Micro Software as a Service Meta Point of Sale Black Friday

Blog Archive