Over two dozen Android apps found stealing user data

Google deletes another 25 Android apps caught stealing user data, including Facebook credentials.

Evina, a French cybersecurity firm, recently discovered a batch of 25 Android apps masking themselves as games, wallpaper, and other useful programs to get at your private information. 

Once a victim downloads one of these apps, it scans the device for other applications. If it finds Facebook, and the malicious software waits for the user to open the social media app.

Once the victim opens Facebook, it triggers the fake app to launch a lookalike browser window over the Facebook login page. If the user puts in the requested login credentials, then the app captures them and ships the details to a remote server. 

It’s been a rough year for the Google Play Store, as one study found that nearly 7% of Google Play apps run background actions. Just last month, Google removed 50 apps from the Play Store for excessive adware. 

The 25 offending apps were reported to Google in May, and the tech giant swiftly deleted them. However, some of these sneaky apps had been available in the Play Store for a year or more. During that time, roughly 2.3 million Android devices downloaded them.

The list of apps reported to Google for this issue is as follows:

  • Super Wallpapers Flashlight
  • Padenatef • Wallpaper Level
  • Contour Level wallpaper
  • iPlayer & iWallpaper
  • Video Maker
  • Color Wallpapers
  • Pedometer
  • Powerful Flashlight
  • Super Bright Flashlight
  • Super Flashlight
  • Solitaire Game
  • Accurate scanning of QR code
  • Classic card game
  • Junk file cleaning
  • Synthetic Z
  • File Manager
  • Composite Z
  • Screenshot Capture
  • Daily Horoscope Wallpapers
  • Wuxia Reader
  • Plus Weather
  • Anime Live Wallpaper
  • Health Step Counter

If you have any of these apps on your Android device, you should immediately delete it and use a different device to change your Facebook password.

Featured Resources

Next-generation time series: Forecasting for the real world, not the ideal world

Solve time series problems with AI

Free download

The future of productivity

Driving your business forward with Microsoft Office 365

Free download

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation

Free download

A quantitative comparison of UPS monitoring and servicing approaches across edge environments

Effective UPS fleet management

Free download

Recommended

FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Almost 70% of CISOs expect a ransomware attack
ransomware

Almost 70% of CISOs expect a ransomware attack

19 Oct 2021
Organizations warned of ransomware risk from smaller operators
ransomware

Organizations warned of ransomware risk from smaller operators

19 Oct 2021
MirrorBlast phishing campaign targets financial companies
phishing

MirrorBlast phishing campaign targets financial companies

15 Oct 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Cryptocurrency: Should you invest?
cryptocurrencies

Cryptocurrency: Should you invest?

27 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021