These 17 Android Apps Contain Joker Malware And Should Be Removed Right Now: View List


google, google play store, android, android apps, apps, app, cybersecurity, security, joker malware,
Image source: PIXABAY

New malicious Android apps found

Google’s Play Store recently became home to a number of apps infected by the popular Joker malware once again, as California-based IT security company Zscaler discovered. While the apps have now been removed from the Google Play Store, they should be removed if they are present on your smartphone so that they can steal your money. Read on to know more about this.

17 Android Apps Found With Joker Malware

According to the report of ZscalerRecently, 17 Android apps were found with the Joker malware. For those who don’t know, Joker malware is a popular type and can steal users’ SMS messages, contact lists, and device information. You can even register users for premium Wireless Application Protocol (WAP) services without their knowledge.

The malware has been found to infect various Android apps and each time it re-infects more with modified code, execution methods, or payload recovery techniques.

It is suggested that the infected apps were downloaded regularly and had more than 120,000 installs on the Google Play Store. Here is the list of apps that were affected:

  • Every good PDF scanner
  • Mint Leaf Message – Your Private Message
  • Unique keyboard – free stylish fonts and emoticons
  • Tangram app crash
  • Direct messenger
  • Private SMS
  • One Sentence Translator – Multifunctional Translator
  • Style Photo Collage
  • Meticulous scanner
  • Desire Translate
  • Talent Photo Editor – Defocused focus
  • Care message
  • Part Message
  • Paper document scanner
  • Blue scanner
  • Hummingbird PDF Converter – Photo to PDF
  • Every good PDF scanner

It is suggested that the Joker malware bypassed the Google Play Store in three ways. The first method included direct download in which the payload was delivered via a direct URL through the command and control (C&C) server. The second method included a one-stage discharge that required a staggered payload to discharge the final payload, while the third method (two-stage discharge) required a two-stage payload to discharge the final payload. You can learn more about this by heading here.

To stay safe from these malicious applications, users are advised to be aware of the type of permissions an application requests. It is always better to read the comments and reviews of the applications before downloading them.

Latest Tech Reviews, News, and More

Fighting Coronavirus: Full Coverage

.