Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
Fake Android apps are being used to steal cryptocurrency wallets

Fake Android apps are being used to steal cryptocurrency wallets

Posted on August 31, 2024September 8, 2024 By rehan.rafique No Comments on Fake Android apps are being used to steal cryptocurrency wallets

We have given you plenty of good reasons to avoid downloading suspicious Android apps over the years, but here’s one more. Recently, researchers at McAfee (via Ars Technica) discovered 280 fake Android apps that scammers are using to access cryptocurrency wallets.

As the researchers note, cryptocurrency wallet owners typically receive mnemonic phrases that they can use to recover their accounts in case they get locked out. These typically consist of 12 to 24 words, and it’s not uncommon to take a screenshot of them.

The fake Android apps unearthed by McAfee’s Mobile Research Team target these phrases by scanning phones for images that might contain them.

McAfee’s researchers say that the malware disguises itself as banking, government, streaming, and utility apps. Scammers spread these apps through phishing campaigns by sending texts or DMs on social media containing links to deceptive websites that look legit. Once there, victims are prompted to download an app that installs the malware on their phones.

Tech. Entertainment. Science. Your inbox.

Sign up for the most interesting tech & entertainment news out there.

By signing up, I agree to the Terms of Use and have reviewed the Privacy Notice.

The fake Android app will then request permission to access all manner of sensitive information, from SMS messages to contacts to storage. The app also wants to run in the background, which should all be red flags, in case you weren’t aware.

If you make it this far, here’s what any of the 280 fake apps can steal from your phone:

  • Contacts: The malware pulls the user’s entire contact list, which could be used for further deceptive practices or to spread the malware even further.
  • SMS Messages: It captures and sends out all incoming SMS messages, which might include private codes used for two-factor authentication or other important information.
  • Photos: The app uploads any images stored on the device to the attackers’ server. These could be personal photos or other sensitive images.
  • Device Information: It gathers details about the device itself, like the operating system version and phone numbers. This information helps the attackers customize their malicious activities to be more effective.

“In such a landscape, it is crucial for users to be cautious about their actions, like installing apps and granting permissions,” McAfee’s mobile researchers say. “It is advisable to keep important information securely stored and isolated from devices. Security software has become not just a recommendation but a necessity for protecting devices.”

Technology

Post navigation

Previous Post: The XR Week Peek (2024.09.02): Meta shuts down Spark AR, Meta may be working on “Puffin” prototype, and more!
Next Post: Mermaids Millions Slot Game Überprüfung, Freispiel and Provision

More Related Articles

The life changing water gadget that has made history: The lifestraw The life changing water gadget that has made history: The lifestraw Technology
KineMaster MOD APK No Watermark 100% Working UNBELIEVABLE KineMaster MOD APK No Watermark 100% Working UNBELIEVABLE Technology
New wireless technology reaches record 1 Tbps data transmission speed New wireless technology reaches record 1 Tbps data transmission speed Technology
Download Clash of Clans MOD Apk Unlimited Money 16.517.16 Download Clash of Clans MOD Apk Unlimited Money 16.517.16 Technology
Learning Casting in Java – Top Bug Net Learning Casting in Java – Top Bug Net Technology
Character AI Unblocked: A Comprehensive Guide Character AI Unblocked: A Comprehensive Guide Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Sister-led social commerce startup Nectar lands $10.6M, reveals more about marketing tech
  • England vs India Test series gets a new name
  • Vietnamese Stop Importing Bitcoin Mining Rigs as Import Ban Looms
  • Apple May Finally Announce Vision Pro VR Controller Support Next Week
  • How to Bring Your Social Media Monetization Strategy to Email

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme