No matter what Google has done over the years, spying apps are still on their way to make their place into Google app store. Yet another dubbed GhostTeam, a malware has discovered, 56 applications seen on Google Play Store that is capable of tracking Facebook credentials and even can display pop-up advertising to users, the security researchers stated that.
Google has tightened the security in the last year to stop malicious apps to make their way to the Google Play Store. But on the other hand, all of the security steps taken by the might search engine does not make a difference and another dubbed GhostTeam, a malware that contains more than 56 apps that are capable of hack Facebook password and can pop-up advertising to the users. The security and the privacy of the Facebook users may compromise.
Facebook Security is at stake
The social messaging app Facebook has billions of active users and the social media platform allow users to send text messages, make audio video calls, chat conversations, shared media files such as photos and videos and VOIP calls. User’s private chats and all others things that they have posted or shared may go into wrong hands. The malicious software available at Google play store enables the attackers to steal the password credentials of a Facebook instant messaging app. Once the hackers or the attackers through spy on social media get their hands on user’s Facebook ID and password, they may get all the private data and the chat conversations and shared media on the social messaging app.
Trend Micro & Avast have come up with the Scope
The two independent cybersecurity organizations Trend Micro and Avast have revealed that the malicious software is using (flashlight, QR code scanner & compass), performance boosting such as filter transfer & cleaner, entertainment, lifestyle & video downloader apps. Similarly to the malware apps, these Android apps don’t have any kind of spiteful code, that is the reason behind they are capable to make their way on Google’s official Play Store.
Once these malicious spying tools are installed, then it confirms either the target device is not an emulator or virtual environment and then downloads the malware play load, and manipulate the target to approve device administrator access to get ingress into the device in the shape of android cell phone gadgets.