Tag Archive for: app’

Do not download fake Anti Scam Centre app onto Android devices: Police


SINGAPORE – Those who are using Android devices are advised by the police not to download any application via an SMS that claims to be from the police’s Anti Scam Centre (ASC).

This is because the Android package kit (APK) file may contain malware which allows scammers to access and take control of the device remotely, and to steal passwords in the device, the police said on Sunday.

In this scam variant, members of the public are sent an SMS claiming to be from ASC and requesting them to download and install an anti-scam app to ensure the security of their devices.

According to the police, the fake app claims to help identify and prevent scams by providing comprehensive protection and security.

The SMS contains a URL link to a fake ASC website with a link to download the app. As part of the app installation, the Android user would be prompted to allow access to the device to enable the anti-scam service.

Those with information relating to such crimes, or who are in doubt, can call the police hotline on 1800-255-0000, or submit it online at www.police.gov.sg/iwitness.

Source…

Appdome powers up mobile app security with latest solution


Appdome, the mobile app defense company, has announced the launch of its new MOBILEBot Defense solution. This solution offers mobile brands bot detection, comprehensive intelligence and rapid defense against malicious bots, credential stuffing and account takeovers (ATOs) in mobile app business lines.

As mobile applications become the dominant in the consumer landscape, mobile bots, malware bots and other automated programs pose a significant threat to business integrity, transaction integrity, security, user accounts and business reputation for mobile app owners, the company states.

Traditional anti-bot offerings are struggling to keep pace with the evolving diversity and sophistication of mobile applications, often trying to force-fit bot defense methods designed for web applications onto mobile frameworks.

This mismatch often requires mobile app developers to face implementation complexities, change the mobile application network stack, remove valuable TLS protections or limit bot defense to a single host.

The result, for an increasingly mobile economy, is that larger parts of the mobile infrastructure are left vulnerable to mobile bot attacks, fraud, ATOs, API abuse, credential stuffing and more.

Tom Tovar, Appdome co-creator and CEO, comments, “Mobile is a unique platform and different technical methods are needed inside Android and iOS apps to detect and stop bots.

“We built the first anti-bot solution tailor-made for the way mobile apps and mobile app attacks work, because that’s where businesses and consumers need it most.”

Appdome’s MOBILEBot Defense solution offers advantages for mobile brands looking to stop mobile bot attacks, fraud, ATOs, API abuse, credential stuffing and more including:

  • Higher performance mobile anti-bot defense to detect and stop mobile bots on any number of hosts, URLs and API endpoints without added cost.
  • Comprehensive mobile device and connection risk detection, providing greater granularity, insight and choice of over 100+ on-device threats like Android and iOS malware, hacking frameworks, instrumentation frameworks, jailbreak, root, Magisk, Zygisk, jailbreak bypass, Man in the Middle (MiTM) attacks and more.
  • Deeper mobile…

Source…

Legitimate Android app transforms into data-snooping malware


ESET researchers have discovered a trojanized Android app named iRecorder – Screen Recorder. It was available on Google Play as a legitimate app in September 2021, with malicious functionality most likely added in August 2022. During its existence, the app was installed on more than 50,000 devices.

iRecorder

Trojanized iRecorder app

The malicious code that was added to the clean version of iRecorder is based on the open-source AhMyth Android RAT (remote access trojan) and has been customized into what ESET named AhRat. The malicious app is capable of recording audio using the device’s microphone and stealing files, suggesting it might be part of an espionage campaign.

Besides the Google Play Store, ESET Research has not detected AhRat anywhere else in the wild. However, this is not the first time that AhMyth-based Android malware has been available on the official store; ESET previously published research on such a trojanized app in 2019. Back then, the spyware, built on the foundations of AhMyth, circumvented Google’s app-vetting process twice, as a malicious app providing radio streaming. However, the iRecorder app can also be found on alternative and unofficial Android markets, and the developer also provides other applications on Google Play, but they don’t contain malicious code.

“The AhRat research case serves as a good example of how an initially legitimate application can transform into a malicious one, even after many months, spying on its users and compromising their privacy. While it is possible that the app developer had intended to build up a user base before compromising their Android devices through an update or that a malicious actor introduced this change in the app; so far, we have no evidence for either of these hypotheses,” explains ESET researcher Lukáš Štefanko, who discovered and investigated the threat.

The remotely controlled AhRat is a customization of the open-source AhMyth RAT, which means that the authors of the malicious app invested significant effort into understanding the code of both the app and the back end, ultimately adapting it to suit their own needs.

Aside from providing legitimate screen recording functionality, the…

Source…

Multiple Vulnerabilities Found in the Kiddoware Kids Place Parental Control Android App


Kiddoware is the world’s leading parental control solutions company with a wide range of products and  serving over 5 million families worldwide. Kiddoware is committed in helping you to protect your kids while providing you intelligence to be proactive about your childs’ online activities.

Earlier this week, SEC Consult Group identified numerous security flaws in a parental control app called Kids Place, which allowed hackers to access login credentials, send files to a child’s device without parental knowledge, or install malware onto the system. These bad actors were even able to remove all restrictions set on the device and bypass any settings established by the parent.

Dr Klaus Schenk, SVP security and threat research at Verimatrix, commented “The vulnerabilities found in the Kiddowares ‘Parental Control – Kids Place’ app for Android underscores the critical importance of prioritising cybersecurity in both the architecture and design of web servers and applications. The root cause lies in the neglect of basic development principles, highlighting the significance of adhering to secure coding practices.

“Developers should follow reputable security frameworks and cybersecurity tools to support them in building secure applications.

“Prevention tactics include:

  • Thorough security scans and adherence to fundamental principles (e.g., password hashing)
  • Applying security scanning to their web design (e.g., security headers assessment, SSL/TLS configuration audit)
  • Applying app hardening and threat detection technologies to monitor/analyse the app’s functionalities to prevent or flag suspicious behaviours

“The vulnerabilities uncovered in the Kiddowares app are a clear-cut indication that integrating robust security measures at every stage of the app development process in a must. By prioritising security in architecture, design, and development, organisations can protect user data, prevent unauthorised access, and uphold the trust of their users.”

Source…