Cybersecurity Researchers Expose ‘Legitimate’ Android App as Malware

The rogue app was listed on Google’s Play Store and has affected user devices since 2021.

June 21, 2023

Malware Warning on Smartphone Device
  • Researchers from ESET, a cybersecurity firm, have revealed an app in Google’s Play Store that maliciously gathered device data from Android users.
  • The app known as IRecorder was found to have been downloaded 50,000 times and has been stealing data since 2021.

Researchers from cybersecurity company ESET detected an Android app hiding malicious code on Google’s Play Store. The app, known as IRecorder, has been downloaded 50,000 times so far and has been available as a legit app since September 2021. According to ESET, the malware was likely added to the app during an update.

The malicious code was added to the clean version of the IRecorder app and was used to steal video and audio files from the users’ devices. The code is based on AhMyth Android RAT (remote access trojan). While the code is not currently found in other Play Store apps, it is not the first time it has infiltrated the official app store.

Apart from its intended screen recording functionality, the malware recorded surrounding audio from the device’s microphone and sent it to the attacker’s servers. It could also send files such as saved web pages, compressed files, audio, video, and documents stored on the device.

The malicious app was removed from the Play Store following ESET’s alert. However, the company could not link the malware to a specific organization.

See More: Blackcat Ransomware Threatens To Leak 80GB Data Unless Reddit Withdraws Its New API Policy

Malware Detected on Android Platforms, Disguised as Security and VPN Apps

Another cybersecurity firm, Cyfirma, found that the nSure Chat and iKHfaa VPN apps on Google’s Play Store were used maliciously by threat actors for information collection from targeted devices.

The malicious apps were tracked to the India-based hacking group “DoNot.” Cyfirma says these apps could prepare devices for more severe malware attacks. Both apps were linked to ‘SecurITY Industry.’ The apps request permissions for accessing contacts and location data.

As per the research, attackers are moving away from phishing email attacks and are now favoring spear messages through platforms such as Telegram or WhatsApp to trick users into downloading spurious apps. 

What measures do you take to keep your devices safe? Let us know your thoughts on LinkedInOpens a new window , TwitterOpens a new window , or FacebookOpens a new window .

Image source: Shutterstock

LATEST NEWS STORIES

Anuj Mudaliar
Anuj Mudaliar is a content development professional with a keen interest in emerging technologies, particularly advances in AI. As a tech editor for Spiceworks, Anuj covers many topics, including cloud, cybersecurity, emerging tech innovation, AI, and hardware. When not at work, he spends his time outdoors - trekking, camping, and stargazing. He is also interested in cooking and experiencing cuisine from around the world.
Take me to Community
Do you still have questions? Head over to the Spiceworks Community to find answers.