Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Bogus ‘Contact Tracing’ Apps Deployed to Steal Data: Researchers

At least a dozen bogus “contact tracing” apps designed to look like official software to track coronavirus infections have been deployed globally to spread malware and steal user data, security researchers said Wednesday.

At least a dozen bogus “contact tracing” apps designed to look like official software to track coronavirus infections have been deployed globally to spread malware and steal user data, security researchers said Wednesday.

The researchers from California-based firm Anomali said the apps, once installed on a device, “are designed to download and install malware” on devices and “steal banking credentials and personal data.”

Anomali said the fake COVID-19 apps do not appear to be distributed through official channels like the Google Play Store but rather are being spread through other apps, third-party stores, and websites that encourage downloads.

“Threat actors continue to imitate official apps to take advantage of the brand recognition and perceived trust of those released by government agencies,” the company said in a blog post.

“The global impact of the COVID-19 pandemic makes the virus a recognizable and potentially fear-inducing name, of which actors will continue to abuse.”

The revelation is the latest warning about hackers using the virus pandemic to take advantage of public fear to trick users into revealing passwords or other data.

Contact-tracing apps are being developed in many countries, using smartphone technology to determine when users have come into contact with an infected individual.

A variety of technologies are being used for the apps, including some systems that have been criticized by privacy activists for collecting data which may be abused by governments.

Some surveys suggest the public is skeptical about using the apps.

Anomali found bogus apps deployed in Armenia, Brazil, India, Colombia, Indonesia, Iran, Italy, Kyrgystan, Russia and Singapore, in some cases impersonating official government tracing applications.

A similar warning last month from a British-based association said fraudsters had tried to get users to download a bogus UK contact tracing app.

 

RelatedCoronavirus-Themed Emails Deliver Malware, Phishing, Scams 

Written By

AFP 2023

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack