Tue, 28-Jun-2022
Thursday 11 Jun 2020 , 2:01 pm

Beware while Downloading the Contact Tracing App, Make Sure if it’s Official or Fake

Anomali Threat Research has found that fake COVID-19 contact tracing apps are spreading malware. As per the research, cybercriminals target androids that have fake apps to steal personal data and monitor devices.
Share at:

Anomali, a provider of intelligence-driven cybersecurity solutions, yesterday announced that threat actors are using fake COVID-19 contact tracing apps to infiltrate Android devices. Anomali state that after being downloaded, the apps install malware. The malware can be used to steal data and conduct device surveillance.

Governments around the world are continuously working with app developers to provide reliable COVID-19 tracing apps as an effort to control the spread of the virus. These apps have functions that include live maps, confirmed COVID-19 cases around that parson, education about COVID-19, real-time location-based alerts, systems for home isolation or quarantine, and direct reporting of symptoms to the government.

In many countries, researchers and citizens have raised concerns regarding the privacy and protection of the data as these apps continuously collect and process personal and sensitive data like health, location, nationality, email address and many. Even if these apps have privacy and security concerns, countries have made its use mandatory.

The programs of contact tracing apps are in widespread use and publicized, the likelihood that threat actors will try and capitalize on government programs will continue to increase.

This graphic show the Arrogya Setu app that is believed to be targeting Android users in India.

The Anomali Threat Research (ATR) team identified that 12 fake apps are targeting citizens in countries including India, Brazil, Armenia, Russia, Indonesia, Iran, Columbia, Italy, Kyrgyzstan, and Singapore. The team has mentioned that the fake health-surveillance apps are downloading Anubis and SpyNote malware, as well as other instances of generic malware.

Anubis is an Android banking trojan. It utilizes overlays to access infected devices, then steals user credentials. SpyNote is an Android trojan and it gathers and monitors data on infected devices. Anomali Team states that the threat actors are distributing the malicious apps via other apps, third-party stores, and websites, among other channels.

Researchers suggest that cybersecurity concerns must be addressed, as the research showed that threat actors are attempting to capitalize on these technology activities for malicious purposes. They also emphasize that it has become necessary for private and public sectors to use technology to handle the crisis wherever possible, as it is not right to neglect a fact that technology creates risks.

Neha Mule

Neha writes articles on sectors including medicine, food, materials, and science & technology. A qualified statistician, she has the ability to observe and analyze the trends in global markets and write compelling articles that help CXOs in decision making. She is a bookworm and loves to read fiction, lifestyle, science and technology. Neha comes with 6 years of experience in content writing and editing that involves blog writing, preparation of study materials and OERs.

More from Neha Mule

Related News