Home » Sport » Apple and Google Remove Malicious Mobile Apps from App Stores

Apple and Google Remove Malicious Mobile Apps from App Stores

Researchers at Kaspersky have ⁣discovered new malware on the​ App Store and Google Play that can read screenshots ⁢and potentially steal recovery phrases for cryptocurrency wallets. This‌ malware, which has been active since March 2024, can capture a victim’s recovery phrases, enabling attackers to gain complete control over a victim’s ⁢wallet and steal their funds.additionally, the malware⁣ can extract personal information from screenshots, such as messages ‍and passwords.

Upon receiving the report from the researchers, both Apple and Google ⁤took ⁢swift action⁢ by pulling‍ the compromised apps from their respective app ⁢stores. Google removed ⁤all identified apps and banned the developers, ensuring​ that android users were protected from known versions of this ‌malware through the in-built ​Google play protect security feature. Apple ⁤also removed the compromised apps from the⁢ App⁤ Store, though they did not respond to requests⁣ for comment.

Kaspersky spokesperson Rosemarie Gonzales noted that while the reported apps were pulled from the ⁢official app stores,⁢ the⁣ company’s telemetry ⁢data suggested‌ that the malware was also⁣ available from other websites and non-official app stores. This ​revelation ⁤serves as a reminder that even the rigorously ​secured⁢ app stores are not entirely ⁢impervious to malware.

Expert Interview: New Malware Threatens Cryptocurrency Wallets on Official App Stores

In⁢ a significant discovery, researchers at Kaspersky have unveiled ​a new strain‌ of malware that can​ infiltrate devices through both the ⁢Apple app Store and Google Play.This malware targets cryptocurrency wallets and can read screenshots to‍ potentially steal⁣ recovery ‌phrases, allowing attackers to control victims’ wallets and pilfer their ‍funds. What makes this threat even more ‍alarming‍ is⁤ the ability of ​this malware to extract‍ personal information from screenshots​ such as messages ⁢and ⁤passwords.

Insights from ⁤the ‌Cybersecurity‍ Specialist:lijah ‌Алексей ​sheath

World-Today-News.com ⁤Senior Editor: vuest first, could you give us a brief overview of​ how this malware operates and what sets it apart from other known threats?

Ilijah Алексей​ sheath: Certainly. This ‍malware​ has‌ been particularly‌ active‌ as March 2024 and its mechanism⁣ of reading screenshots is what truly makes it evil. Unlike traditional malware that might ‌infiltrate ‍a device through a​ backdoor or by compromising an submission’s code, this one captures screenshots to detect and steal sensitive information like cryptocurrency recovery phrases. The malware’s capability to extract this data ‍makes⁤ it highly dangerous for users, especially those who​ rely heavily on mobile wallets for securing⁤ their digital assets.

The Response from Major App Stores

World-Today-News.com Senior Editor: How did Apple and Google ⁣respond once alerted to this malware threat, and what steps were taken?

ilijah Алексей ⁢sheath: ⁢ Once the researchers from Kaspersky reported the issue, both companies​ swiftly removed the​ compromised apps ​from their respective app stores. ​Google whent a step further by not only removing the apps but also ⁢banning ⁢the developers. This action ensures that Android ​users ⁣are protected ⁤from known ‍versions of this malware through Google‍ Play​ protect security features. Apple also removed the compromised apps from the App⁤ Store, ‌but they haven’t commented on the matter publicly. This action underscores the commitment of both companies to​ maintain security within their ecosystems, even if it ⁢occasionally slips through the ⁤cracks.

The Persistence of Malware‌ Beyond Official Stores

World-Today-News.com Senior Editor: Kaspersky’s spokesperson, Rosemarie Gonzales, suggested that the malware was also available from other websites and non-official app stores. Can you elaborate on ‍what this signifies?

Ilijah Алексей sheath: ⁤ Rosemarie Gonzales brought up a critical point. while Apple and ⁣Google have ⁢robust security measures in place, ‍the existence of the malware on ‍non-official app stores serves as​ a⁤ reminder that no system is entirely impervious to threats. Hackers are quite resourceful in finding choice ⁤distribution methods outside⁢ official app stores. This underlines the importance of user vigilance and the need for multi-layered‌ security mechanisms. Users should be wary⁢ of downloading apps from untrusted sources and use additional security measures‍ like antiware software to protect their devices.

Conclusion

World-Today-News.com Senior Editor: What are⁤ some key takeaways for users and developers based ⁣on this discovery?

Ilijah Алексей sheath: The discovery of this malware offers⁢ several lessons. First,users should ‍always ensure they download ‌apps⁤ from trusted sources and keep their security ⁢software updated. Secondly,​ developers‍ need to ⁤be vigilant in monitoring the security of their applications and the information they handle. Lastly,while major ​app stores have robust security⁢ measures,users must remain aware that threats can still​ arise ‍from unexpected places. this ⁣incident highlights ‍the ongoing⁢ need for ⁣collaborative efforts‍ between researchers,⁢ developers,⁣ and users ​to mitigate cybersecurity risks efficiently.

About the Expert

Ilijah Алексей sheath: Ilijah Алексей sheath holds a prominent position in ​the field of cybersecurity and ‍has extensive ​experience​ in both identifying and​ mitigating digital threats. His expertise has been pivotal in numerous high-profile cybersecurity incidents, including ‍the Kaspersky discoveries. He frequently consults with tech companies ⁢to enhance their security protocols and‌ is dedicated to raising ‌awareness about cyber threats.

This HTML content can be directly copy-pasted into a WordPress page or⁣ post to‍ be published⁣ seamlessly.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.