Złoczyńcy wykorzystują popularne aplikacje do atakowania naszych smartfonów

Smartphones not only serve as a source of information but also act as gateways to various services, including financial services. Criminals have numerous opportunities if they gain control over our devices. As a result, attacks on Android phone users are becoming more common, often exploiting popular apps.

Immediate Removal from the Phone

Most of us use one or several messaging apps. Applications like WhatsApp, with 2 billion users monthly, and Telegram, with 700 million users, are highly popular. Therefore, it is not surprising that attackers often target our phones using these types of apps.

Criminals frequently utilize fake versions of popular messaging apps, which contain hidden malicious software. This can be used to take control of the device, steal data, or even gain access to our bank accounts. There are many websites online that pretend to be official, with the main objective of convincing users to download the fake versions of the apps.

However, this is not the only method used by scammers. In 2021, WhatsApp and Signal users received messages offering a new app skin. In reality, it was a large-scale phishing campaign, with the links containing malicious software.

Unfortunately, criminals sometimes manage to deceive the Play Store as well. In 2023, a fake version of the Signal messenger named BadBazaar appeared on the store, containing malware. Although it was quickly removed, some users had already downloaded it.

So, what can be done? Here are a few simple rules that can help minimize the risk of installing malicious software:

– Only download apps from trusted sources like Google Play.
– Update apps and the operating system whenever a new version is available.
– Do not click on suspicious links in messages, websites, and social media.
– Do not grant unnecessary permissions to apps.
– Use phone security features such as fingerprint scanners.
– Avoid downloading programs and apps from unknown sources.

Source: WeLiveSecurity

The source of the article is from the blog foodnext.nl