Amid the ongoing pandemic, several coronavirus-related apps were developed to track and manage the positive cases across the globe. During the same phase, the researchers at Quick Heal Security Labs have also detected threat actors coming up with fake oximeter apps. The team found that malware authors were misusing the official apps with trojan to steal user’s banking credentials.
How an attack is executed?
Attackers primarily target the app stores, where both free and paid apps are available. They use different tools like firebase or GitHub to deploy these fake apps and different app markets like QooApp, Huawei, etc. for effective publishing and distribution among a large base of users. While threat actors are always seeking opportunities to compromise users, it is extremely critical to stay alert at every point possible.
How to stay safe?
The researchers have shared some tips to stay safe against such fake app attacks. For instance, download apps only from reliable sources like Google Play Store. Also, learn how to identify fake apps, even from Google Play Store because threat actors always have a way to barge in. Don’t open links shared through messages or on social media platforms. Check for grammar errors in the app descriptions as attackers usually use the wrong English.
Since reviews and ratings can also be fake, focus more on reviews with low ratings. Avoid approaching to third-party app stores for downloading apps or through links shared via SMSs, emails and WhatsApp. These avenues don’t invest in security and hence make space for any type of app, including the infected ones. Most importantly, invest in a robust anti-virus Mobile Security solution.