Joker malware: Every day Google removes malware - containing applications to Play Store of. Cybersecurity Security CSIS recently unveiled a new one malware called Joker and has been active since June of this year. The malware not only signed up for subscribers, but stole text messages, contact list and device information.
According to CSIS, malware was found in 24 applications hosted on Google Play and have over 500.000 downloads. Google has removed these apps from its play store.
Joker malware secretly clicks on ads and saves text messages that have auth codes that verify payments.
Joker spyware has been able to influence through these applications users in 37 countries: Australia, Austria, Belgium, Brazil, China, Cyprus, Greece, Turkey, Egypt, France, Germany, Portugal, Spain, United Kingdom, Ghana, Honduras, India, Indonesia, Ireland, Kuwait, Malaysia O, Malaysia Poland, Qatar, Republic of Argentina, Serbia, Ukraine, Singapore, Slovenia, Sweden, Switzerland, Thailand, United Arab Emirates and United States.
Joker spyware checks the cards SIMs. related to one of the above countries. It seems to have affected mainly users from Europe and Asia.
Spyware bypasses Google Play controls and hides the malicious code in the ad boxes.
If you have these applications listed below, delete them immediately:
- Advocate Wallpaper
- Certain Wallpaper
- Dazzle Wallpaper
- Spark Wallpaper
- Age Face
- Collate Face Scanner
- Rapid Face Scanner
- Leaf Face Scanner
- Print Plant scan
- Altar Message
- Climate SMS
- Ruddy SMS
- Declare Message
- Antivirus Security – Security Scan
- Beach Camera
- Cute Camera
- Display Camera
- Humor Camera
- Mini Camera
- Soby Camera
- Board picture editing
- Reward Clean
- Great VPN
- Ignite Clean
After dozens hacking incidents, Google needs to take a closer look at the applications that have been published in its app store and to thoroughly review third-party applications that use the Playback Protection feature. Worst of all is that hackers integrate malware into preinstalled applications that come with a new device. Therefore, users should be more suspicious of the applications they use.