Unlike what happens on iOS, Google does not prohibit installing applications from third-party stores: the problem with this BigG philosophy is that the risk of being infected with malware is much higher when the apps do not come from the Play Store. Bitdefender security researchers have discovered two new malware for the green robot’s operating system hiding behind the icon of the most famous applications.
The first is called TeaBot: once the app behind which the malware is hiding is installed and launched, it will ask for different permissions, including that of being shown above other apps. Obviously, the malware will always be running and will collect important data such as SMS or verification codes for two-factor authentication, to be sent later to attackers.
The second malware is called Flubot and works in a different way: in fact, this is transmitted via SMS and has the ability to replicate itself by sending SMS from the infected device; also in this case it collects sensitive data. Both malware, once installed, will take the form of more noble applications, such as VLC or Kaspersky Antivirus.
Security researchers then let it be known that 79.5% of Teabot malware was discovered in Spain, while 11.18% is widespread in Italy and 4.6% is widespread in the Netherlands. We, therefore, invite you to check for the presence of fake applications on your smartphones (in the photo below you can see the differences in the name and icon of the original and fake apps).
If you like our news and you want to see such news even further, then follow RealMi Central on Google News, Telegram (RealMi Central, Xiaomi, Apple, Realme, Samsung, Microsoft, OnePlus, Huawei/Honor, Android 12), Twitter, Facebook (Page) (Group) & Instagram.