Security News > 2021 > July > Updated Joker Malware Floods into Android Apps
Joker has been around since 2017, disguising itself within common, legitimate apps like camera apps, games, messengers, photo editors, translators and wallpapers.
Once installed, Joker apps silently simulate clicks and intercept SMS messages to subscribe victims to unwanted, paid premium services controlled by the attackers - a type of billing fraud that researchers categorize as "Fleeceware." The apps also steal SMS messages, contact lists and device information.
Malicious Joker apps are commonly found outside of the official Google Play store, but they've continued to skirt Google Play's protections since 2019 too.
One way they're doing that is to use Flutter, which is an open-source app development kit designed by Google that allows developers to craft native apps for mobile, web and desktop from a single codebase.
"After successful installation, the application infected with Joker will run a scan using Google Play APIs to check the latest version of the app in Google Play Store," they explained.
AppGallery - the official app store for Huawei Android - was recently found to be infested with apps that contained the Joker trojan.
News URL
https://threatpost.com/updated-joker-malware-android-apps/167776/
Related news
- TrickMo malware steals Android PINs using fake lock screen (source)
- Russia targets Ukrainian conscripts with Windows, Android malware (source)
- Android malware "FakeCall" now reroutes bank calls to attackers (source)
- New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls (source)
- New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers (source)
- Cyber crooks push Android malware via letter (source)