HomeMobilesHackers are now using gaming apps to spoof consumers: McAfee

Hackers are now using gaming apps to spoof consumers: McAfee

Steps to keep your data protected from malicious apps

- Advertisement -

Turn These mobile malware attacks have become the most common problem and the users should turn their attention toward their mobile safety as well as privacy. Now a new report has surfaced on the internet that proves that hackers sneak into your smartphones via hidden mobile apps. These seal your important information and data from your device and remain hidden inside your smartphone

According to a new mobile threat report 2020 by McAfee that discovered that nowadays hackers have found a new way to sneak into your devices with the help of hidden mobile apps, third-party login and counterfeit gaming videos to target consumers. It stated that last year hackers targeted consumers with a wide variety of methods, from backdoors to mining cryptocurrencies. 

- Advertisement -

McAfee found out that hackers have expanded the ways of hiding their attacks, making them increasingly difficult to identify and remove, which makes it seem like 2020 will be the year of mobile sneak attacks. 

The hidden apps are known to be the most active mobile threat that has been generating almost 50 percent of all malicious activities in 2019- a 30% increase from 2018. These keep on targeting the consumers via those apps they spend the most time on- their devices. Hidden apps take advantage of unsuspecting consumers in voluminous ways, this also includes evoking the consumers to use third-party login services or serving unwanted ads. 

- Advertisement -

Venkat Krishnapur, Vice-President of Engineering and Managing Director, McAfee India said, “Mobile devices hold the key to our lives – both corporate and personal. Unfortunately, they are also amongst the easiest attack vectors for cybercriminals because consumer awareness levels towards the security of their devices and apps are low. Hidden apps have emerged as the most active mobile threat category and it’s highly advisable consumers stay vigilant with regards to where they download applications from, what they click and also ensure they use the right security software on their devices, to enable detection and protection of their digital lives.”

According to the report, the hacker makes the most of the increasing popularity of gaming by circulating vicious apps by providing links in popular gamer chat apps and cheat videos by creating their own content containing links to fake apps. These apps pretend as genuine with icons that exactly mimic those of the real apps but set out unwanted ads while collecting user’s data. These malicious apps include FaceApp, Spotify and Call of Duty that also have fake versions that are trying to victimize unsuspecting consumers, especially younger users.  

- Advertisement -

McAfee also discovered that new information on mobile malware dubbed LeifAccess, also known as Shopper. It is a malware and makes use of the accessibility features in Android to create accounts, download apps, and post reviews using names and emails configured on the victim’s device. These apps are being widely distributed through social media, gaming platforms, malvertising, and gamer chat apps. Fake warnings are used to get the user to activate accessibility services, enabling the full range of the malware’s capabilities. 

Also, a series of   South Korean transit apps, implicated a fake library and plugin that could extract confidential files, called MalBus. According to the research the attack was hidden in a verified south Korean transit app by hacking the original developer’s Google Play account. This leads to passing a range of information for each region of South Korea, such as bus stop locations, route maps, and schedule times for more than 5 years.

Hacks to protect your privacy as well as important data:

  • While most of these malicious apps make through social media, fake ads, and other unofficial app sources So, before you download any app do some quick research. Try to find out about the source and developer. Many of these have been flagged by other users.
  • Secondly, read reviews to know if the app is genuine or not. Look out for reviews that reuse the same simple phrases that are an indication of fake reviews and this might be a suspicious app.
  • Use far-reaching security software on all your devices such as computers, tablets, or smartphones which will keep your data safe from cyberthreats.
  • All your apps should be frequently updated so that they have the latest fixes and security protections.
  • Try using an ID monitoring tool that will keep you well aware of the changes or actions which you did not make. These may have been caused by malware and could indicate that your phone or account has been compromised. 

For the latest gadget and tech news, and gadget reviews, follow us on TwitterFacebook and Instagram. For newest tech & gadget videos subscribe to our YouTube Channel. You can also stay up to date using the Gadget Bridge Android App.



- Advertisement -

Support Us

We are a humble media site trying to survive! As you know we are not placing any article, even the feature stories behind any paywall or subscription model. Help us stay afloat, support with whatever you can!

Support us
- Advertisement -
- Advertisment -
- Advertisement -


Please enter your comment!
Please enter your name here

- Advertisement -
- Advertisement -

Follow Us

- Advertisement -

Must Read

WWDC23: iPadOS 17 brings redesigned Lock Screen and interactive widgets and more

WWDC23: iPadOS 17 brings redesigned Lock Screen and interactive widgets and...

Apple at its Worldwide Developers Conference (WWDC23) previewed the latest versions of iOS 17, iPadOS 17, macOS 14, watchOS 10, and tvOS 17. The...
- Advertisement -
- Advertisement -
- Advertisement -

You cannot copy content of this page