kmiainfo: If you have it, delete it immediately Google bans 21 Android applications used by millions If you have it, delete it immediately Google bans 21 Android applications used by millions

If you have it, delete it immediately Google bans 21 Android applications used by millions

المحتالون استخدموا 470 تطبيقا موجودا على متجر "غوغل بلاي" لإصابة أجهزة 105 ملايين مستخدم لأندرويد في جميع أنحاء العالم (رويترز) 1/2/2022 وقع أكثر من 100 مليون من مستخدمي نظام أندرويد (Android) ضحايا برنامج خبيث انتشر عبر مئات التطبيقات على متجر "غوغل بلاي"، للحصول على خدمات اشتراك باهظة الثمن من دون علمهم، حسب تقرير نشره موقع "إكسبريس" (Express).  وأطلق على حملة الاحتيال اسم "دارك هيرنغ" (Dark Herring)، حيث استخدم المحتالون 470 تطبيقا موجودا على متجر "غوغل بلاي" لإصابة أجهزة 105 ملايين مستخدم لأندرويد في جميع أنحاء العالم.  وأطلقت العملية في وقت مبكر من مارس/آذار 2020، حيث سجل الضحايا سرا في خدمات الاشتراك باهظة الثمن التي فرضت عليهم ما يزيد على 11 جنيها إسترلينيا (نحو 15 دولارا) في الشهر. ويُعتقد أن عملية "دارك هيرنغ" كلفت مستخدمي أندرويد مئات الملايين من الجنيهات الإسترلينية إجمالا.  ووقع مستخدمو أندرويد في 70 دولة ضحية للخداع بعد تنزيل التطبيقات المخترقة التي تنشر الاحتيال من متجر "غوغل بلاي" الرسمي.  وحُمّلت تطبيقات أندرويد الأكثر شيوعا التي تنشر "دارك هيرنغ" عدة ملايين من المرات، واكتشف خبراء الأمن في شركة "زيمبيريم" (Zimperium) عملية احتيال "دارك هيرنغ". وهذه الشركة هي شريك غوغل وعضو في "غوغلز آب ديفينس آلينس" (Google’s App Defense Alliance) الذي يعمل على معالجة تهديد البرامج الضارة على "متجر بلاي".  وبدل محاولة فرض رسوم على بطاقة ائتمان أو خصوم مرتبطة بمتجر تطبيقات "غوغل بلاي"، يتم دفع الأموال مقابل الاشتراكات الوهمية عبر نظام الدفع المباشر المعروفة اختصارا بـ"دي سي بي" (DCB).  وتتيح طريقة الدفع هذه للأشخاص إضافة تكلفة المحتوى الرقمي الذي تم شراؤه عبر متجر "بلاي" إلى فاتورة شركة الاتصالات الشهرية.  وباستخدام طريقة الدفع هذه للاشتراكات الوهمية، فهذا يعني أن الضحايا قد لا يدركون أنه تم تحصيل رسوم عليهم مقابل شيء لم يريدوه إلا بعد أسابيع.   وقالت "زيمبيريم" -في معرض شرح نتائجها على الإنترنت- "تبدو تطبيقات أندرويد الخبيثة هذه غير ضارة عند النظر إلى وصف المتجر والأذونات المطلوبة، لكن هذا الإحساس الزائف بالثقة يتغير عندما يتم تحصيل رسوم من المستخدمين شهريا مقابل الخدمة المتميزة التي لا يتلقونها عبر الفواتير المباشرة لشركات الاتصالات.  وعلى عكس العديد من التطبيقات الضارة الأخرى التي لا توفر إمكانات وظيفية، يمكن للضحية استخدام هذه التطبيقات؛ مما يعني أنها تُترك غالبا مثبتة على الهواتف والأجهزة اللوحية بعد فترة طويلة من التثبيت الأولي.  وفي وقت نشر بحثها، قالت "زيمبيريم" إنه تمت إزالة جميع التطبيقات الضارة من متجر "غوغل بلاي"، إلى جانب مواقع التصيد وخدمات الاحتيال المصاحبة.  وإذا كنت تتساءل عما إذا كنت في خطر، فإليك قائمة تضم 21 تطبيقا الأكثر شيوعا التي عثر عليها في متجر "غوغل بلاي"، واستخدمت لنشر الاحتيال:  Smashex. Upgradem. Stream HD. Vidly Vibe. Cast It. My Translator Pro. New Mobile Games. StreamCast Pro. Ultra Stream. Photograph Labs Pro. VideoProj Lab. Drive Simulator. Speedy Cars – Final Lap. Football Legends. Football HERO 2021. Grand Mafia Auto. Offroad Jeep Simulator. Smashex Pro. Racing City. Connectool. City Bus Simulator 2. والآن إذا قمت بالفعل بتثبيت هذه التطبيقات قبل حذفها من متجر غوغل، فستظل معرضا للخطر رغم أن هذه التطبيقات أزيلت من متجر "غوغل بلاي"، ولهذا تحقق مما إذا كانت هذه التطبيقات سجّلت عليك أي اشتراكات باهظة من دون أن تدرك ذلك.   وستتمكن من القيام بذلك في قسم الملف الشخصي في تطبيق متجر غوغل، ضمن "المدفوعات والاشتراكات". وبعد إلغاء أي اشتراكات مشبوهة، تأكد من حذف التطبيق الخبيث من جهازك كليا.       If you have it, delete it immediately Google bans 21 Android applications used by millions  More than 100 million Android users have fallen victim to a malicious program that has spread through hundreds of applications on the Google Play Store, to obtain expensive subscription services without their knowledge, according to a report published by Express .  The scam campaign was dubbed "Dark Herring", as fraudsters used 470 applications found on the Google Play Store to infect the devices of 105 million Android users around the world.  The process was launched as early as March 2020, as victims secretly registered for expensive subscription services that charged them more than £11 (about $15) a month. Operation Dark Hearing is believed to have cost Android users hundreds of millions of pounds in total.  Android users in 70 countries fell victim to the scam after downloading the hacked apps that spread the scam from the official Google Play Store.  The most popular Android apps that publish Dark Hearing have been downloaded several million times, and the Dark Hearing scam was discovered by security experts at Zimperium. This company is a Google partner and a member of the Google's App Defense Alliance, which works to address the malware threat on the Play Store.  Instead of trying to charge a credit card or debits linked to the Google Play app store, the money is paid for dummy subscriptions via a direct payment system known as DCB.  This payment method allows people to add the cost of digital content purchased through the Play Store to their monthly carrier bill.  By using this payment method for fake subscriptions, it means that victims may not realize they were being charged for something they didn't want until weeks later.  Explaining its findings online, Zimperem said, “These malicious Android apps appear harmless when looking at the store description and required permissions, but this false sense of trust changes when users are charged monthly for premium service that they do not receive via direct billing. telecom companies.  Unlike many other malicious applications that do not provide functionality, the victim can use these applications; This means that they are often left installed on phones and tablets long after the initial installation.  At the time of publishing its research, Zimperem said that all malicious apps had been removed from the Google Play Store, along with phishing sites and accompanying scam services.  And if you're wondering if you're at risk, here's a list of the 21 most common apps found on the Google Play Store and used to spread the scam:  Smash. Upgrade. Stream HD. Vidly Vibe. Cast It. My Translator Pro. New Mobile Games. StreamCast Pro. Ultra Stream. Photograph Labs Pro. VideoProj Lab. Drive Simulator. Speedy Cars - Final Lap. Football Legends. Football HERO 2021. Grand Mafia Auto. Offroad Jeep Simulator. Smashex Pro. Racing City. Connect. City Bus Simulator 2. Now if you have already installed these apps before they were deleted from the Google Play store, you will still be at risk even though these apps were removed from the Google Play Store, so check if these apps registered any expensive subscriptions to you without you realizing it.  You'll be able to do this in the profile section of the Google Play Store app, under "Payments and subscriptions." After canceling any suspicious subscriptions, make sure to delete the malicious app from your device completely.

If you have it, delete it immediately Google bans 21 Android applications used by millions


More than 100 million Android users have fallen victim to a malicious program that has spread through hundreds of applications on the Google Play Store, to obtain expensive subscription services without their knowledge, according to a report published by Express .

The scam campaign was dubbed "Dark Herring", as fraudsters used 470 applications found on the Google Play Store to infect the devices of 105 million Android users around the world.

The process was launched as early as March 2020, as victims secretly registered for expensive subscription services that charged them more than £11 (about $15) a month. Operation Dark Hearing is believed to have cost Android users hundreds of millions of pounds in total.

Android users in 70 countries fell victim to the scam after downloading the hacked apps that spread the scam from the official Google Play Store.

The most popular Android apps that publish Dark Hearing have been downloaded several million times, and the Dark Hearing scam was discovered by security experts at Zimperium. This company is a Google partner and a member of the Google's App Defense Alliance, which works to address the malware threat on the Play Store.

Instead of trying to charge a credit card or debits linked to the Google Play app store, the money is paid for dummy subscriptions via a direct payment system known as DCB.

This payment method allows people to add the cost of digital content purchased through the Play Store to their monthly carrier bill.

By using this payment method for fake subscriptions, it means that victims may not realize they were being charged for something they didn't want until weeks later.

Explaining its findings online, Zimperem said, “These malicious Android apps appear harmless when looking at the store description and required permissions, but this false sense of trust changes when users are charged monthly for premium service that they do not receive via direct billing. telecom companies.

Unlike many other malicious applications that do not provide functionality, the victim can use these applications; This means that they are often left installed on phones and tablets long after the initial installation.

At the time of publishing its research, Zimperem said that all malicious apps had been removed from the Google Play Store, along with phishing sites and accompanying scam services.

And if you're wondering if you're at risk, here's a list of the 21 most common apps found on the Google Play Store and used to spread the scam:

Smash.
Upgrade.
Stream HD.
Vidly Vibe.
Cast It.
My Translator Pro.
New Mobile Games.
StreamCast Pro.
Ultra Stream.
Photograph Labs Pro.
VideoProj Lab.
Drive Simulator.
Speedy Cars - Final Lap.
Football Legends.
Football HERO 2021.
Grand Mafia Auto.
Offroad Jeep Simulator.
Smashex Pro.
Racing City.
Connect.
City Bus Simulator 2.
Now if you have already installed these apps before they were deleted from the Google Play store, you will still be at risk even though these apps were removed from the Google Play Store, so check if these apps registered any expensive subscriptions to you without you realizing it.

You'll be able to do this in the profile section of the Google Play Store app, under "Payments and subscriptions." After canceling any suspicious subscriptions, make sure to delete the malicious app from your device completely.

Post a Comment

Previous Post Next Post