• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » scam » Android Apps Used in Cryptocurrency Scams

Android Apps Used in Cryptocurrency Scams

2021-07-07 by Michelle Dvorak

Android Apps Cryptocurrenccy Scams

Fake cryptocurrency mining apps Stole Money from

Over 170 Android apps were found to be scamming users who downloaded them. The apps purported to mine cryptocurrencies, but instead they stole money.

The crypto mining apps took money from by charging fees for mining services they never provided.  It’s common to pool computing resources used in crypto mining as the process is processor and electricity intensive.

The majority of apps charged a fee for the initial download. they offered subscriptions that users could pay for via Google Play. Some apps also included fake upgrades, faster crypto mining rates, and options to net additional profits.

To snag more victims, an additional scheme offered 20% earning of any friends who are referred to the app.

Payment was accepted through legitimate payment gateways. Some of the apps also accepted Bitcoin and Ethereum as payment options.

“Because of the simplicity and agility of cloud computing, it is quick and easy to set up a realistic-looking crypto mining service that is really a scam, “ say cyber security researchers at Lookout Threat Lab.

READ Six Essential Cryptocurrency Terms and Definitions

Sophisticated Crypto Mining Scam App

Many of the apps had similar design and programming underneath it all. They even included a dashboard as well as a tally of how many coins the users had earned.

The apps themselves caused no harm to the device they are installed on. There is no malware or spyware. Users are of course unable to transfer any of their earned coins to a cryptocurrency wallet because no coins were ever mined.

Image Credit: Lookout Threat Lab

Of the 170 scam apps, 25 of them were on Google’s official app store, Google Play.

Lookout calculated that the scammers earned $300,000 USD from app downloads and another $50,000 USD through non-existent upgrades.

Google has since remove the apps from Google Play.

How to Spot a Scam Mining App

People using antivirus apps on their phones and tablets are generally protected from malicious apps and their schemes.

  1. Read app reviews before downloading anything. Comments from other users often will give away that an app is either nonfunctional or an outright scam.
  2. Be sure to read the terms of service so you are not giving away personal information to the developer.
  3. Never give any app or software more permission than it needs to do its job. For example, a cryptocurrency mining app does not need to access all your contacts or photos to run. Requesting excessive permissions or access is a major indicator of fraud.
  4. Beware of apps that either crash often or slow down your phone. Read our guide if your phone is slow, chewing through battery life, or running hot. Learn to look for the telltale signs of a malicious app.
  5. Never download an app from inside another app or game.
  6. Always install apps from an official source like the Apple Store or Google Play. Yes, it’s true that some of these scam apps actually made it to Google Play, but they were discovered and removed. You’re far less likely to encounter a scam app when downloading from an app store or the producer’s official website.

Filed Under: scam Tagged With: bitcoin

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version