![]() ![]() “This time,” Ahmed says, “a hacker stitched together basic, readily available third-party apps to bypass Play Store’s protections, in order to lace malware in a handful of everyday utility apps.” New privacy protections are coming, but this appears as Google following Apple before it falls too far behind. I’d have more sympathy for Google’s fight against novel approaches such as this to evade its security if it wasn’t for its seemingly casual approach to adware, the fact that apps like SuperVPN find their way back onto the store despite repeated bad behavior, and if permission abuse on Android wasn’t so rife. As Check Point explains, “the payload dropped by Clast82 does not originate from Google Play, thus the scanning of applications before submission to review will not prevent the installation of the malicious payload.” But once approved and switched on, it downloaded dangerous malware onto the device. And, switched off, it didn’t exhibit any bad behaviors when operating. Put simply, the app uploaded to Play Store had no issues with its own code and so didn’t trigger any alerts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |