Google Exiled 20 Espionage Android Apps, Which were Stealing Users Data and Recording Calls


android Updated 28th July, 2017 by Joshua Anderson

SHARE
http://www.mobileappdaily.com
349 Views

Google just discarded 20 of the Android apps from the Google Play store after finding that these apps were fetching the users personal data from their devices.

These 20 applications made their way to the 100 Android devices and secretly extracting the sensitive data of the users. When Google finds out that these apps are containing the code to monitor the user’s secured data including the text messages, Location, emails, voice calls and other personal data the company immediately exiled these apps from the market.

These apps entered the rooted Android devices that are running the older version of the Android. The root status of the Android device lets the rogue apps bypass the operating system security  easily. Afterwards, the apps are open to the user's personal data from where they fetch the information like text, emails, and files. These 20 applications did the same and were outsourcing the user's data to the server controlling by the developers. These apps are also fetching the data from the other apps like WhatsApp, Viber, Hike, and Telegram, which includes text messages, images, and videos. However, all these applications have encrypted the user information which is too hard for the hacker to intercept messages while in transit.

These expatriate apps used tempting utilities to grab the user attention like cleaning files and backing up the data in order to perform the surveillance activities. Google also finds the roots of the apps, from where the apps were being deployed, according to the company there are evidences showing that apps are developed by a cyber arms firm called Equus technologies.

Google also mentioned in the post on Wednesday that the researchers also found a new type of Surveillance apps “Lipizzan”. According to the company's researchers, these are two stage tools, the first stage is distributed over the Google Play as an app. Once the app is installed the spyware downloads the second stage, which is some sort of license authorization and then finally roots to the user's device to transfer the data to the spyware creator.

Google has deeply searched and examine the apps in the Google Play Store and find out the techniques used by the malware to bypass the security. Based on the information from researchers the tech giant just enrolled a new security feature named Google play protect. The Google Play Protect automatically scans the installed applications or about-to-be install apps and informs the user if found something amiss.

For the Latest tech news and reviews, follow MobileAppDaily on Twitter, Facebook, LinkedIN, Instagram and Flipboard.

Was this article helpful?

Quick Buzz
  • More than 40 Disney Apps are accused of spying on the Kids and stealing Information.
  • Google fires the Engineer who wrote the schismatic manifesto on gender diversity.
  • The Investor Benchmark says Uber could worth $100 billion in the next couple years.
  • YouTube added video sharing option and messaging feature to its app today.
  • Google is reportedly working on a news based system to rival Snapchat.

mobile app industry

Category

  • News

    106 Post