Skip to content
Up To Date Time

Up To Date Time

  • Home
  • Sports
  • cryptocurrency
  • Technology
  • Virtual Reality
  • Education Law
  • More
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
  • Toggle search form
Fake Android apps are being used to steal cryptocurrency wallets

Fake Android apps are being used to steal cryptocurrency wallets

Posted on August 31, 2024September 8, 2024 By rehan.rafique No Comments on Fake Android apps are being used to steal cryptocurrency wallets

We have given you plenty of good reasons to avoid downloading suspicious Android apps over the years, but here’s one more. Recently, researchers at McAfee (via Ars Technica) discovered 280 fake Android apps that scammers are using to access cryptocurrency wallets.

As the researchers note, cryptocurrency wallet owners typically receive mnemonic phrases that they can use to recover their accounts in case they get locked out. These typically consist of 12 to 24 words, and it’s not uncommon to take a screenshot of them.

The fake Android apps unearthed by McAfee’s Mobile Research Team target these phrases by scanning phones for images that might contain them.

McAfee’s researchers say that the malware disguises itself as banking, government, streaming, and utility apps. Scammers spread these apps through phishing campaigns by sending texts or DMs on social media containing links to deceptive websites that look legit. Once there, victims are prompted to download an app that installs the malware on their phones.

Tech. Entertainment. Science. Your inbox.

Sign up for the most interesting tech & entertainment news out there.

By signing up, I agree to the Terms of Use and have reviewed the Privacy Notice.

The fake Android app will then request permission to access all manner of sensitive information, from SMS messages to contacts to storage. The app also wants to run in the background, which should all be red flags, in case you weren’t aware.

If you make it this far, here’s what any of the 280 fake apps can steal from your phone:

  • Contacts: The malware pulls the user’s entire contact list, which could be used for further deceptive practices or to spread the malware even further.
  • SMS Messages: It captures and sends out all incoming SMS messages, which might include private codes used for two-factor authentication or other important information.
  • Photos: The app uploads any images stored on the device to the attackers’ server. These could be personal photos or other sensitive images.
  • Device Information: It gathers details about the device itself, like the operating system version and phone numbers. This information helps the attackers customize their malicious activities to be more effective.

“In such a landscape, it is crucial for users to be cautious about their actions, like installing apps and granting permissions,” McAfee’s mobile researchers say. “It is advisable to keep important information securely stored and isolated from devices. Security software has become not just a recommendation but a necessity for protecting devices.”

Technology

Post navigation

Previous Post: The XR Week Peek (2024.09.02): Meta shuts down Spark AR, Meta may be working on “Puffin” prototype, and more!
Next Post: Mermaids Millions Slot Game Überprüfung, Freispiel and Provision

More Related Articles

EMEET Stream Cam One Webcam Review EMEET Stream Cam One Webcam Review Technology
Why multi-agent AI tackles complexities LLMs can’t Why multi-agent AI tackles complexities LLMs can’t Technology
The Digital Sentinel of Modern Enterprises  – Technology News The Digital Sentinel of Modern Enterprises  – Technology News Technology
A Field Guide to Rapidly Improving AI Products – O’Reilly A Field Guide to Rapidly Improving AI Products – O’Reilly Technology
Conditional Rendering In LWC – DevFacts | Tech Blog | Developer Community Conditional Rendering In LWC – DevFacts | Tech Blog | Developer Community Technology
Network Namespace without Docker | Adaltas Network Namespace without Docker | Adaltas Technology

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Painters need two wins to get quarterfinal bonus
  • Finally Bullish? Solana (SOL) Bounces Off
  • Why Business Owners Have Started Using an Ad Blocker Normally Used at Home
  • Teen Star Mhatre to Lead India U-19 Charge in England Tour, Suryavanshi too earns a place
  • Bitcoin Climbs To $105K While Support At $96,700 Remains In Focus

Categories

  • cryptocurrency
  • Education Law
  • Sports
  • Technology
  • Virtual Reality

Copyright © 2025 Up To Date Time.

Powered by PressBook Blog WordPress theme