Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Software

Malicious Health App Discovered on Amazon App Store Harvesting User Data Through Screen Recording

Malicious Health App Discovered on Amazon App Store Harvesting User Data Through Screen Recording

A sophisticated piece of Android spyware masquerading as a simple BMI calculator has been discovered on the Amazon Appstore, raising serious concerns about the security of third-party app marketplaces. Security researchers at McAfee Labs identified the malicious application, named ‘BMI CalculationVsn‘, which was designed to steal sensitive user data while providing basic health calculations as a cover.

The deceptive application, published under the name ‘PT Visionet Data Internasional’, presented itself as a straightforward body mass index calculator but concealed powerful surveillance capabilities. While users interacted with its seemingly innocent interface, the app secretly initiated screen recording services and collected sensitive information from infected devices.

McAfee’s investigation revealed a particularly concerning aspect of the malware’s operation: it exploited user psychology by timing its permission requests to coincide with moments of interaction. When users clicked the ‘Calculate’ button, the app would prompt for screen recording permissions, taking advantage of users’ tendency to approve requests during active engagement with an application.

The spyware’s capabilities extended beyond screen recording. Researchers discovered that the application performed comprehensive device scans to catalog all installed applications, providing attackers with valuable intelligence about potential targets. More alarmingly, the malware was designed to intercept and collect SMS messages, including sensitive one-time passwords and verification codes used for secure authentication.

The application’s development timeline provides insight into its evolving threat capability. Initially appearing on October 8, the app underwent significant modifications by month’s end, including changes to its visual identity, the addition of more malicious functions, and alterations to its certificate information. These changes suggest an active development cycle aimed at expanding its harmful capabilities while maintaining its disguise as a legitimate health application.

See also  iOS 18 Unveils Dedicated Passwords App and iMessage Upgrades for a Streamlined Digital Life

While McAfee researchers noted that some features, such as the screen recording function, appeared to be in a testing phase – with recorded content stored locally rather than transmitted to command and control servers – the sophisticated nature of the malware highlights the growing challenges in maintaining app store security. Even established platforms like the Amazon Appstore, which serves as a pre-installed service on Amazon Fire devices and as an alternative to Google Play, can inadvertently host dangerous applications despite their security measures.

The discovery holds particular significance given the Amazon Appstore’s reach. As a pre-installed service on Amazon’s Fire tablets and Fire TV devices, and an alternative platform for Android users seeking options beyond Google Play, the store’s security directly impacts a substantial user base. This includes users attracted by exclusive Amazon Prime gaming content and those unable or unwilling to use Google’s platform.

In response to McAfee’s findings, Amazon removed the application from its store. However, users who have already installed the malicious app must take additional steps for protection, including manually removing the application and performing comprehensive device scans to eliminate any remaining traces of the malware.

Security experts emphasize the importance of preventive measures in light of this discovery. Users are strongly advised to exercise caution when installing applications, particularly by limiting their downloads to well-established publishers with verifiable track records. Additionally, careful attention should be paid to permission requests, with users encouraged to regularly review and revoke unnecessary permissions from installed applications.

The incident serves as a reminder of the critical role played by security tools like Google Play Protect, which can detect and block known malware identified by App Security Alliance partners. Keeping such protective measures active represents an essential layer of defense against evolving digital threats, even when using alternative app stores.

See also  How to Use YouTube Create for Video Content Creation

About the author

Ade Blessing

Ade Blessing is a professional content writer. As a writer, he specializes in translating complex technical details into simple, engaging prose for end-user and developer documentation. His ability to break down intricate concepts and processes into easy-to-grasp narratives quickly set him apart.

Add Comment

Click here to post a comment