Skip to main content

Popular CamScanner app for Android infected with nasty malware

CamScanner app has been deleted by Google from Play Store.

The IT security researchers at Kaspersky have discovered a dangerous malware in the CamScanner app, a tremendously popular application for Android devices used by more than 100 million users around the world.
The purpose of the CamScanner app is to turn a smartphone into a portable scanner by allowing users to scan, save,  sync and collaborate on content across smartphones, tablets, and computers. This time however Kaspersky researchers have identified the presence of a malware in the app available on Google Play Store – which is bad news for unsuspecting Android users.
Dubbed Trojan-Dropper.AndroidOS.Necro.n by researchers; the malware was previously found preinstalled in cheap Chinese smartphones. As the name indicates, the malware drops/downloads additional malware equipped with capabilities like downloading more pieces of malicious modules.
The main purpose of this malware, according to Kaspersky’s blog post, is to make a profit. To achieve their goal; the malware spams targeted devices with intrusive onscreen advertisements and forces victims to signup for paid subscriptions. This can also allow malware authors to snoop on victim’s activities and steal login credentials for social media and banking apps.
“As a result, the owners of the module can use an infected device to their benefit in any way they see fit, from showing the victim intrusive advertising to stealing money from their mobile account by charging paid subscriptions, said Kesperskt in its technical analysis.
Here, it is worth mentioning that although CamScanner itself is a legitimate app, Kaspersky researchers believe that the snippet of malicious code in the app belonged to a third-party in its PDF creator. 
Good news is that at the time of publishing this article; Google had removed the CamScanner app from Play Store. On the other hand, CamScanner’s developers have acknowledged the presence of malicious code in their app but maintained that its iOS version has not been impacted.
Another positive development is that developers have confirmed releasing a new version of the app which hopefully will hit Play Store without the snippet of malicious code. 
Popular CamScanner app for Android infected with nasty malware
Image credit: Kaspersky/Play Store
If you have downloaded the app on your smartphone recently, it is advised to remove it asap. Furthermore, scan your device with a reliable anti-virus softwareregularly, keep automatic updates enabled and only install CamScanner app once the company confirms its official release.

Comments

Popular posts from this blog

List Of Sql Infected Sites-HACKEREAD

SQL injection  is a  code injection  technique, used to  attack  data-driven applications, in which malicious  SQL  statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).  SQL injection must exploit a  security vulnerability  in an application's software, for example, when user input is either incorrectly filtered for  string literal   escape characters  embedded in SQL statements or user input is not  strongly typed  and unexpectedly executed. SQL injection is mostly known as an attack  vector  for websites but can be used to attack any type of SQL database. List of SQL Infected sites:  http://www.genhound.co.uk/source.php?id=477 http://www.lcoastpress.com/journal.php?id=8 http://www.travellers-tales.co.uk/travelJournal.php?id=42 http://www.arrowvalves.co.uk/content.php?id=8 http://www.reaplasrack.co.uk/content.php?id=129 http://www.arrowval...

Google dork list for XSS (Cross- site scripting)-2020

GOOGLE DORK LIST FOR Cross-site scripting -2020 Google Dorks  its also known as google query ,List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website, specific file type and some interesting information from unsecured Websites. Google Dorks list  2020 can uncover some incredible information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. payment card data). Here you can see an example to understand how  Google Darks   password  used by hackers to gain sensitive information from specific websites. You can also use for Exploit DB site to give you according to you Search state. https://www.exploit-db.com/ “ inurl: domain/ ” “ additional dorks A hacker would simply use in the desired parameters as follows: inurl = the URL of a site you want...

Popular Android Zombie game phish users to steal Gmail credentials

The app made its way to Google Play Store was also found phishing users for Facebook credentials. Scary Granny ZOMBY Mod: The Horror Game 2019 is the latest game on Google Play Store that is condemned by the digital security fraternity for sneakily stealing personal data from unsuspecting users. The game, which has been downloaded for over 50,000 times, was available for Android devices making Android users its primary target. The malicious app attempts to collect sensitive information such as Facebook and Gmail login credentials. The malicious activities of Scary Granny ZOMBY Mod were detected by the mobile security firm Wandera. The company found out that the app asks users to enter their Gmail or other Google account credentials, which are then used for collecting private data of the user by hijacking the account –  All of this happens, unsurprisingly, without alerting the user. Gmail phishing page on the supposed gaming app (Screenshot: Wandera) Rese...