New Delhi: Amid the surge in demand for oximeters in the lethal second Covid wave in India, security researchers have detected fake oximeter apps on Play Store.
The team from Quick Heal Security Labs found that malware authors were misusing the official apps with trojan to steal users` banking credentials. “Threat actors use reliable tools to deploy payload and third-party app stores for distribution of these fake apps,” the researchers said in a statement.
Attackers primarily target the app stores, where both free and paid apps are available. They use different tools like firebase or GitHub to deploy these fake apps and different app markets like QooApp, Huawei, etc. for effective publishing and distribution among a large base of users.
“While threat actors are always seeking opportunities to compromise users, it is extremely critical to stay alert at every point possible,” the team said. They advised not to open links shared through messages or on social media platforms.
“Check for grammar errors in the app descriptions as attackers usually use the wrong English,” they noted. Since reviews and ratings can also be fake, focus more on reviews with low ratings.
“Avoid approaching to third-party app stores for downloading apps or through links shared via SMSs, emails and WhatsApp. These avenues don`t invest in security and hence make space for any type of app, including the infected ones,” the researchers said.
googletag.pubads().setTargeting('category', ["article","Technology","Oximeter","Google Play Store","Spam"]); googletag.pubads().enableLazyLoad({ fetchMarginPercent: 50, renderMarginPercent: 50, mobileScaling: 2.0 }); googletag.pubads().disableInitialLoad(); googletag.pubads().enableAsyncRendering(); googletag.pubads().set('page_url','https://zeenews.india.com/'); googletag.pubads().collapseEmptyDivs(); googletag.enableServices(); // OpenWrap code START here if(typeof PWT.requestBids === 'function'){ PWT.requestBids( PWT.generateConfForGPT(googletag.pubads().getSlots()), function(adUnitsArray) { PWT.addKeyValuePairsToGPTSlots(adUnitsArray); PWT.ow_BidsReceived = true; initAdserver(false); } ); } // No need to handle "else" part as we have A9 wrapper on page // OpenWrap code END here var FAILSAFE_TIMEOUT = 1000; // this timeout should be more than OpenWrap and A9 timeout setTimeout(function() { initAdserver(true); // calling this function with forced mode set to true so that GPT API is always executed }, FAILSAFE_TIMEOUT); }); googletag.cmd.push(function() { googletag.display('div-article-rhs-atf-ad'); }); googletag.cmd.push(function() { googletag.display('div-gpt-ad-1504525832454-0'); }); googletag.cmd.push(function() { googletag.display('div-gpt-ad-1504525832454-2'); }); googletag.cmd.push(function() { googletag.display('div-gpt-ad-1504526235866-6'); }); if(inad1){ googletag.cmd.push(function() { googletag.display('div-gpt-ad-AS-Inarticle-1'); }); } if(inad2){ googletag.cmd.push(function() { googletag.display('div-gpt-ad-AS-Inarticle-2'); }); }
} on_load_google_ad(PWT);
function on_load_fb_twitter_widgets(){ (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = "https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.9"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));
window.twttr = (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0], t = window.twttr || {}; if (d.getElementById(id)) return t; js = d.createElement(s); js.id = id; js.src = "https://platform.twitter.com/widgets.js"; fjs.parentNode.insertBefore(js, fjs); t._e = []; t.ready = function(f) {
t._e.push(f); }; return t; }(document, "script", "twitter-wjs")); }
//setTimeout(function() { on_load_google_ad(); }, 5000);
setTimeout(function() {
on_load_fb_twitter_widgets();
}, 5000);
Source link