A malicious app was discovered in the Google Play store and had been collecting data from Android users since September 2021, according to cybersecurity software provider Eset.
The recorder-screen recorder app has received 50000 downloads and has been accused of stealing the data of Android users since September 19, 2021.
Eset claims that “the recorder – screen recorder app was first uploaded to the store on September 19th, 2021 without any harmful features. The release of version 1.3.8 in August 2022, however, indicates that dangerous functionality was subsequently added.
According to the report’s conclusion, “the malicious code that was added to the trojan-free version of the recorder is based on the open-source myth Android rat (remote access trojan) and has been customized into what we named ahead.”
The app can steal files from an Android user’s phone, including document files, audio files, video files, saved webpages, images, and file formats.
“the app’s particular harmful behavior, such as gathering files with specific extensions and recording microphone audio”
Also Read:- Reddit Hackers Threaten To Leak 80GB Data, Demand ₹37 Crores
Additionally, eset stated that they could not connect the program to any specific malicious group.
Google removed the malicious app from the store following the report.
To start with, to lessen the likelihood that we will become victims, we must take cybersecurity seriously. Here are a few strategies for avoiding malware on Android:
India's Victory in T20 World Cup Final In an electrifying final at Barbados' Kensington Oval…
IIT Kanpur celebrated its 57th convocation by awarding degrees to 2,332 graduates in a ceremony…
With time social media has become an integral part of everybody’s life. People from all…
Korean dramas, or K-dramas, have taken the world by storm! These exciting TV shows from…
Indian Innings Winning the toss England asked India to bat first. With the Hitman going…
Reliance Jio and Bharti Airtel have announced tariff hikes. This move will boost the companies'…
This website uses cookies.
Read More