Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Facebook Miscellaneous Automation Artificial Intelligence Holiday Training Gadgets Covid-19 Compliance Cloud Computing Remote Work Outsourced IT Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Bandwidth Blockchain Windows 10 Wi-Fi Two-factor Authentication Apps Data Security Mobile Office Managed Services Vendor WiFi Tip of the week Chrome Employer-Employee Relationship Budget Networking Apple App Voice over Internet Protocol Mobile Device Management BYOD Gmail Access Control Office 365 Conferencing Hacker Managed IT Services Avoiding Downtime How To BDR Marketing HIPAA Computing Physical Security Applications Information Technology Big Data Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Computers Bring Your Own Device 2FA Website Healthcare Operating System Router Virtual Private Network Risk Management Printer The Internet of Things Windows 7 Paperless Office Infrastructure Microsoft 365 Social Monitoring Solutions Document Management Managed IT Service Customer Service Telephone Scam Windows 11 Data loss Cooperation Excel Patch Management Going Green Remote Workers Save Money Remote Monitoring Vulnerability End of Support Vendor Management Firewall Cybercrime Free Resource Project Management Display Processor Images 101 Mobile Security Computer Repair Virtual Desktop Multi-Factor Authentication Mobility Data storage LiFi Smart Technology Outlook Machine Learning Saving Time Money Employees Integration Humor Customer Relationship Management Maintenance Sports Hacking Downloads Antivirus Mouse Presentation Holidays Licensing Data Storage Entertainment Administration Wireless Technology Supply Chain Video Conferencing Managed Services Provider Virtual Machines Professional Services Telephone System Robot Cost Management Word Settings Printing Wireless Content Filtering iPhone IT Management VPN Meetings YouTube Vulnerabilities Data Privacy Cryptocurrency Safety User Tip Modem Google Docs Database Unified Communications IT Assessment Experience IT Maintenance Tech Support IT Technicians Running Cable Value Business Intelligence Network Management Bitcoin Flexibility Proxy Server Google Wallet Organization Cookies Cyber Monday Monitors Shortcuts Digital Security Cameras Tactics Smart Devices Hotspot Ransmoware Websites Mirgation Laptop Application Memory Vendors Windows 8 Remote Working Drones Nanotechnology Data Breach Google Play Be Proactive SharePoint Videos Addiction IBM Electronic Health Records Language Electronic Medical Records Workforce Chatbots Halloween Wasting Time Threats Management Lenovo Screen Reader Trend Micro Distributed Denial of Service Writing Security Cameras Workplace Strategies Meta Service Level Agreement Software as a Service Computing Infrastructure Virtual Reality Private Cloud Identity Scary Stories Managing Costs Amazon Server Management Hacks Superfish Bookmark Identity Theft Smart Tech Competition eCommerce Fun SSID Virtual Assistant Outsource IT Download Deep Learning Surveillance Alerts Twitter Error Virtual Machine Environment Media Browsers Reviews Connectivity Education Break Fix Social Engineering Medical IT User Transportation Small Businesses Upload Development Remote Computing Hypervisor Displays Multi-Factor Security Social Network Mobile Computing Shopping Tablet IoT Optimization Dark Web Search PowerPoint Employer/Employee Relationships Outsourcing Trends Best Practice IP Address Alert Managed IT Customer Resource management PCI DSS File Sharing Regulations Buisness Google Calendar Dark Data Navigation Data Analysis Legal Gig Economy Star Wars IT solutions Microsoft Excel How To Workplace Notifications Staff Recovery Teamwork Hiring/Firing Gamification Business Growth Internet Service Provider Regulations Compliance Travel Social Networking Hard Drives Legislation Evernote Paperless Techology Fileless Malware Google Maps Domains Memes Cortana Co-managed IT Wearable Technology SQL Server Technology Care Content Alt Codes Net Neutrality Health IT Financial Data Unified Threat Management Motherboard Downtime Refrigeration History Comparison Business Communications Unified Threat Management Directions Smartwatch Assessment Hosted Solution Public Speaking IT Permissions Scams Azure Hybrid Work Typing Lithium-ion battery Procurement Telework Cyber security Specifications Network Congestion Entrepreneur Tech Human Resources User Error Microchip Google Drive CES Internet Exlporer Communitications Fraud Knowledge Cables Username Supply Chain Management FinTech Point of Sale Undo Black Friday 5G Term Google Apps

Blog Archive