• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » News » Joker Malware Targeting Android Users

Joker Malware Targeting Android Users

2020-10-02 by Michelle Dvorak

Joker Malware Android

Cyber security researchers found over 60 Joker malware variants on Google Play and third-party app stores. Once downloaded, these apps compromise the device. They can download more malware or spend your money.

Joker malware targets Android devices. It steals SMS text messages contact lists, and device information. it can even register a user for paid services and subscriptions.

Cyber security researchers at Zscaler found 17 Trojanized apps while a report from  Zimperium found 64 Joker Trojans. Some of these apps have been downloaded over 120,000 times in September alone.

“…malicious applications can find their way to user’s devices through third party stores, sideloaded applications and malicious websites that trick users into downloading and installing apps.,” says  Zimperium.

Joker malware is not a single malicious program but a family of malwares that attacks Android devices. Once downloaded to a device, the infected app downloads more malware to the phone.

Jokes Hide Amongst Other Apps

Joker malware often masquerades as games, wallpaper, or other seemingly harmless apps. In official app stores, weaponized apps sometimes impersonate other legitimate apps to trick a user into downloading it to their phones. Joker malware is a Trojan malware meaning it lures the user into downloading it, but then quickly begins to download other malicious programs. The malware may use interstitial screens most phone users know – like a loading progress bar or spinner – to disguise the other file donwloads.

17 Infected apps found on the Google Play store by Zscaler

  1. All Good PDF Scanner
  2. Mint Leaf Message-Your Private Message
  3. Unique Keyboard – Fancy Fonts & Free Emoticons
  4. Tangram App Lock
  5. Direct Messenger
  6. Private SMS
  7. One Sentence Translator – Multifunctional Translator
  8. Style Photo Collage
  9. Meticulous Scanner
  10. Desire Translate
  11. Talent Photo Editor – Blur focus
  12. Care Message
  13. Part Message
  14. Paper Doc Scanner
  15. Blue Scanner
  16. Hummingbird PDF Converter – Photo to PDF
  17. All Good PDF Scanner

How to Spot Suspicious Apps

Hackers often use games and other apps to lure unsuspecting mobile users into downloading their malware. Follow these safe practices to help avoid potentially harmful apps to your phone or tablet.

  1. Be suspicious of apps that ask for unnecessary permissions. For example, an app may ask for permission to access your contact list or camera. Sometimes an app requests access to contacts so it can find other friends who play the same game. However, sometimes apps ask for all possible permissions like access to contact, file storage, cameras calendars, phone calls, and SMS text messages. This is a sign that the app is either poorly written or potentially harmful.
  2. Be highly suspicious of any app that asks for access to your text messages, phone call logs, contact list, and location data. This makes sense for messaging apps but not for games or business tools like PDF scanners.
  3. Always read reviews about an app before downloading it. See how long the app has been available and what other users are saying about the app. Check out the developer.
  4. Never download an app outside of the Google play store or the Apple store. Both app stores have safeguards in place to reduce the number of harmful apps. But the system is not foolproof. Apps downloaded from within games or from third-party sites are not necessarily protected or screened for malware or malicious computer code.

Filed Under: News Tagged With: Android, app

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version