Home » Technology » The Malware Joker is back. Be sure not to download these applications

The Malware Joker is back. Be sure not to download these applications

Returned. Hazardous malware called the Joker, which in disguise as an otherwise named application can misuse the bank details of the user and empty his account, attacks the Android operating system again. Currently, two lists are circulating around the Internet. The first is eight apps that have been convicted of Joker’s presence and deleted from the Play Store. However, the Zscaler server is currently draws attention to another 16 applications, which are also said to be infected.

Where the Joker malware demonstrably was

  • Auxiliary Message
  • Element Scanner
  • Fast Magic SMS
  • Free CamScanner
  • Go Messages
  • Super Message
  • Super SMS
  • Travel Wallpapers

The Malware Joker first appeared in 2017, when it attacked an incredible 1,700 applications before being removed by the Play Store. Another major occurrence occurred in September 2020, when there were 24 applications. They collected over 500,000 installations before deleting and deprived users of money from more than 30 countries. Minor injuries occur from time to time. The principle of theft is fake “subscription”which unobtrusively but very persistently draws a small amount of money.

Where else it can be (still available applications)

  • Private SMS
  • Hummingbird PDF Converter – Photo to PDF
  • Photo Collage Style
  • Talent Photo Editor – Blur focus
  • Paper Doc Scanner
  • All Good PDF Scanner
  • Care Message
  • Part Message
  • Blue Scanner
  • Direct Messenger
  • One Sentence Translator – Multifunctional Translator
  • Mint Leaf Message-Your Private Message
  • Unique Keyboard – Fancy Fonts & Free Emoticons
  • Tangram App Lock
  • Desire Translate
  • Meticulous Scanner

As you can see, in the world of viruses, malware and other attack software is always about about fake applications dubious tools for chatting, editing photos or various beautifiers. Be sure to be very careful with this type of tool. And definitely avoid applications from the list with a big arc.

How would you react if you fell victim to such an attack?

Source: entrepreneur

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.