Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Yes, Even Apps from Official App Stores Can Be Malicious

Yes, Even Apps from Official App Stores Can Be Malicious

McAfee recently released a list of 15 applications the company identified as “predatory loan apps” available for download from the Google Play Store. While steps have been taken to remove them from the platform, we can now discuss how mobile applications can be weaponized if a user is not careful.

Let’s start by discussing the current issue of SpyLoan apps.

How Can Malicious Apps Sneak Onto the Play Store?

SpyLoan apps—much like many shopping applications and websites around this time of year—aren’t overtly malicious in the same way that other app-based threats are. These apps commonly work as malware, taking up storage space and exfiltrating data. 

SpyLoan apps operate more insidiously. Instead of installing malicious software and infecting the device, these apps operate as phishing attacks.

These apps work as financial applications, offering highly accessible loans that result in debt and invasions of a user’s privacy. These behaviors are also malicious, but SpyLoan apps can slip past the app store’s checks using social engineering instead of coded threats. As a result, they appear on Google Play and take advantage of the platform’s inherent trust. This trend has been observed (and has grown) since 2023.

This Makes It Crucial to Only Install Trusted Apps

It just goes to show that threats can even slip past the protections that Google has defending its platforms.

This makes it critical to be extremely selective regarding the applications you install, only using trusted sources and installing well-known and reputable software titles—specifically, the legitimate versions.

Warning Signs of Malware on Mobile Devices

There are a few indications to keep an eye out for that your device may be infected.

On the Device Itself:

  • Slower operation
  • Virus alerts
  • Missing storage space
  • Inoperable antivirus software
  • An inoperable device

In the Device’s Browser:

  • Invasive pop-up ads and tabs
  • Your browser redirects to other pages or ads
  • Your homepage or default search change without your permission
  • Virus alerts
  • Unwanted installs

Mobile Apps Can Be Used Offensively in Many Ways

Historically, attackers have used mobile applications in various ways to deliver attacks to mobile devices. From putting up apps and pushing malicious code in an update to phishing, as we see here, you must exercise some judgment before installing any application.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Mobile Device Managed Service Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Facebook Miscellaneous Automation Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps App Mobile Device Management BYOD Gmail WiFi Managed Services Voice over Internet Protocol Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking BDR Marketing HIPAA Computing Applications Information Technology Access Control Office 365 Conferencing Hacker How To Avoiding Downtime Website Operating System Router Physical Security 2FA Virtual Private Network Risk Management Health Big Data Help Desk Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Computers Bring Your Own Device Managed IT Services Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Firewall Vendor Management Cybercrime Windows 11 Display Printer The Internet of Things Excel Paperless Office Infrastructure Monitoring Social Remote Workers Document Management Customer Service Free Resource Telephone Project Management Scam Windows 7 Data loss Microsoft 365 Cooperation Robot Employees Telephone System Cost Management Integration Word Settings Wireless Printing Content Filtering IT Management VPN Holidays YouTube Meetings Data Storage Safety Cryptocurrency User Tip Modem Supply Chain Computer Repair Mobile Security Processor Video Conferencing Managed Services Provider Virtual Machines Virtual Desktop Professional Services LiFi Data storage Smart Technology Outlook Machine Learning Money Saving Time iPhone Humor Customer Relationship Management Managed IT Service Vulnerabilities Maintenance Data Privacy Antivirus Hacking Sports Downloads Images 101 Mouse Presentation Licensing Multi-Factor Authentication Mobility Administration Entertainment Wireless Technology IT solutions Star Wars Workforce How To Microsoft Excel Videos Legal Data Analysis Electronic Health Records Business Growth Gamification Wasting Time Threats Recovery Notifications Staff Legislation Trend Micro Hard Drives Travel Social Networking Security Cameras Workplace Strategies Google Maps Meta Cortana Techology Fileless Malware Software as a Service Domains Alt Codes Content Managing Costs Amazon Wearable Technology Comparison Health IT eCommerce Refrigeration Downtime Unified Threat Management Motherboard SSID Hosted Solution Assessment Virtual Assistant Outsource IT Permissions Unified Threat Management Directions Surveillance Public Speaking Lithium-ion battery Typing Virtual Machine Environment Media Network Congestion Specifications Reviews Medical IT Entrepreneur Internet Exlporer Transportation Small Businesses Knowledge Fraud Google Drive User Error Microchip Development Username Hypervisor Displays 5G Black Friday Shopping Optimization Undo Point of Sale PowerPoint Unified Communications Database Employer/Employee Relationships Outsourcing Experience Google Docs PCI DSS Bitcoin Network Management Running Cable Tech Support IT Technicians Navigation Monitors Cyber Monday Gig Economy Google Wallet Proxy Server Cookies Workplace Tactics Teamwork Hiring/Firing Hotspot Internet Service Provider Regulations Compliance Windows 8 Application Laptop Websites Mirgation Evernote Paperless Drones Memes Nanotechnology Co-managed IT Addiction SQL Server Technology Care Electronic Medical Records Language SharePoint Net Neutrality IBM Financial Data Management History Halloween Chatbots Business Communications Writing Distributed Denial of Service Smartwatch Lenovo IT Screen Reader Scams Service Level Agreement Azure Hybrid Work Virtual Reality Computing Infrastructure Procurement Telework Hacks Server Management Cyber security Scary Stories Private Cloud Identity Tech Human Resources Fun CES Superfish Bookmark Communitications Competition Identity Theft Smart Tech Cables Deep Learning Download Twitter Alerts Supply Chain Management FinTech Error Term Google Apps Social Engineering Break Fix Browsers IT Assessment Education Connectivity IT Maintenance Flexibility Upload Value Business Intelligence User Remote Computing Organization Mobile Computing Social Network Shortcuts Multi-Factor Security Tablet IoT Ransmoware Search Dark Web Digital Security Cameras Smart Devices Remote Working IP Address Best Practice Trends Memory Vendors Alert Dark Data Google Calendar Managed IT Customer Resource management Data Breach Buisness File Sharing Regulations Google Play Be Proactive

Blog Archive