04:48 GMT26 May 2020
Listen Live
    Get short URL
    0 37

    At least 24 popular Android apps - downloaded hundreds of thousands of times from the Google Play Store - are infected with malware dubbed 'Joker', LifeHacker reported, citing cybersecurity pundits.

    The "Joker" is mainly designed to secretly sign users up for paid subscription services.

    “For example, in Denmark, Joker can silently sign the victim up for a 50 DKK/week service (roughly 6,71 EUR). This strategy works by automating the necessary interaction with the premium offer’s webpage, entering the operator’s offer code, then waiting for an SMS message with a confirmation code and extracting it using regular expressions. Finally, the Joker submits the extracted code to the offer’s webpage, in order to authorize the premium subscription”, Aleksejs Kuprins from the cybersecurity company CSIS said, cited by LifeHacker.

    According to the report, those infected with malware Joker apps, before being removed from the Google Play store, managed to gain over 472,000 total of downloads.

    According to a cybersecurity pundit, cited by LifeHacker, it is impossible to spot any unexpected paid subscriptions while using one of the infected apps.

    It is better to check personal bank accounts or credit cards as far back as June of this year - the time when the Joker malware started kicking off its latest batch of auto-subscriptions, LifeHacker said.

    The list of the infected apps reportedly include "Advocate Wallpaper", "Age Face", "Altar Message", "Antivirus Security - Security Scan", "Beach Camera", "Board picture editing" and others.


    Man Who Accidentally Stopped WannaCry Sentenced to Supervised Release for Selling Banking Malware
    Beware! Borrowed Charging Cables Can Hijack Devices With Malware (Video)
    Who Hacks the Hackers? French Cybercrime Unit Remotely Neutralizes Malware Op in ‘World First’
    Google Play Store Detects Malware in Android App With 100 Million Downloads - Report
    virus, apps, android, joker malware
    Community standardsDiscussion
    Comment via SputnikComment via Facebook