Security News > 2021 > July > Updated Joker Malware Floods into Android Apps

Joker has been around since 2017, disguising itself within common, legitimate apps like camera apps, games, messengers, photo editors, translators and wallpapers.
Once installed, Joker apps silently simulate clicks and intercept SMS messages to subscribe victims to unwanted, paid premium services controlled by the attackers - a type of billing fraud that researchers categorize as "Fleeceware." The apps also steal SMS messages, contact lists and device information.
Malicious Joker apps are commonly found outside of the official Google Play store, but they've continued to skirt Google Play's protections since 2019 too.
One way they're doing that is to use Flutter, which is an open-source app development kit designed by Google that allows developers to craft native apps for mobile, web and desktop from a single codebase.
"After successful installation, the application infected with Joker will run a scan using Google Play APIs to check the latest version of the app in Google Play Store," they explained.
AppGallery - the official app store for Huawei Android - was recently found to be infested with apps that contained the Joker trojan.
News URL
https://threatpost.com/updated-joker-malware-android-apps/167776/
Related news
- New FireScam Android malware poses as RuStore app to steal data (source)
- New FireScam Android data-theft malware poses as Telegram Premium app (source)
- FireScam Android Malware Poses as Telegram Premium to Steal Data and Control Devices (source)
- DoNot Team Linked to New Tanzeem Android Malware Targeting Intelligence Collection (source)
- Crypto-stealing iOS, Android malware found on App Store, Google Play (source)
- SpyLend Android malware downloaded 100,000 times from Google Play (source)