Hidden Apps, 3rd Party Logins Are Responsible For 50% Of Mobile Hacks; Don’t Do This Ever!
It has been found that hidden apps have become the most targeted vectors to conduct an active mobile threat to consumers, by the hackers. In fact, hackers continue to target consumers through channels that they spend the most time on, their mobile phones.
Hackers Getting in through Hidden Apps
Hacking through third party apps and hidden apps on mobile phones, have become the most exploited technique for a hacker to get his way into a victim’s personal and financial data. This is mainly because consumer awareness levels towards security of their devices and apps are low.
Hidden apps have emerged as the most active mobile threat category and it’s highly advisable consumers stay vigilant with regards to where they download applications from, what they click and also ensure they use the right security software on their devices, to enable detection and protection of their digital lives.
Also, according to McAfee Mobile Threat Report 2020, hackers distribute malicious apps through links in popular gamer chat apps and cheat videos by creating their own content containing links to fake apps.
These apps pose genuine with icons that closely mimic those of the real apps but serve unwanted ads and collect user data. McAfee researchers uncovered that popular apps like FaceApp, Spotify and Call of Duty all have fake versions trying to prey on unsuspecting consumers, especially younger users.
The Danger is Growing Rapidly: Don’t Do This!
It has been estimated that by 2020, the average person globally is expected to own 15 connected devices. This means there is just so much, an entire universe of ideas for hackers to hack into your device.
There exists a growing trend for many apps to remain hidden, stealing precious resources and important data from the device that acts as the remote control to consumers’ digital world.
Now, more than ever, it is critical consumers make themselves aware of modern threats and the steps they can take to defend themselves against them, such as staying on legitimate app stores and reading reviews carefully.
Other mobile malware, dubbed LeifAccess, uses third-party sign-on to cheat app-ranking systems. This malware takes advantage of the accessibility features in Android to create accounts, download apps, and post reviews using names and emails configured on the victim’s device.
McAfee researchers observed apps based on LeifAccess being distributed via social media, gaming platforms, advertising and gamer chat apps. Fake warnings are used to get the user to activate accessibility services, enabling the full range of the malware’s capabilities.
Comments are closed, but trackbacks and pingbacks are open.