{"id":16578,"date":"2018-02-22T18:00:47","date_gmt":"2018-02-22T23:00:47","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=16578"},"modified":"2022-04-28T09:12:02","modified_gmt":"2022-04-28T13:12:02","slug":"can-apps-repackaged-malware","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/can-apps-repackaged-malware\/","title":{"rendered":"How Can Apps be Repackaged With Malware?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The world of technology is great in so many ways, but it also can present some serious dangers. When it comes to hackers and those with malicious motives, they are unfortunately relentless and ruthless when it comes to finding a way to get your information. From your banking information to credit card numbers to even personal information that you wouldn\u2019t want shared with a stranger, they find crafty and downright frightening ways to break into your personal devices. To keep your Android phone safe from prying eyes, use dfndr security\u2019s full virus scan to scan your phone and SD card for malware and viruses:<\/span><\/p>\n<p><center><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=Blog&amp;c=How_Can_Apps_be_Repackaged_With_Malware\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-9829 size-full\" src=\"http:\/\/cdn.blog.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg\" alt=\"\" width=\"353\" height=\"79\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/a><center><\/center><\/center>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">One of the criminal methods used by cybercriminals involves repackaging apps with malware. This may seem like a confusing concept, but it\u2019s a simple one &#8211; and it\u2019s something to definitely be aware of as you use your mobile device. Especially since so many of us use and enjoy apps on our phones, it\u2019s certainly something to lookout for.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When an app becomes popular &#8211; whether it is one for productivity, a game, or something in between, it\u2019s not uncommon for other developers to put \u201cknock offs\u201d of that app on app stores to give users more variety. However, these choices may come with a price. Cybercriminals are frequently masking what is actually malware in these alluring apps\u2019 packaging.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How this works is that before apps are distributed, the hackers add a malicious code to them. This could lead to issues such as premium service abuse &#8211; which causes users to unknowingly wrack up charges &#8211; to data theft and even anti-malware deactivation.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The scariest thing about this is that users will not even know that it\u2019s happening as the \u201cmalicious\u201d app runs on their phones. The function of the app will be likely to run exactly as an unsuspecting user would expect it to, all the while exposing him or her to harm to their device and even their personal life and finances.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users should keep in mind that hackers are crafty. They create these apps to look nearly identical to the original, which can lead to users even downloading them by accident and not even realizing they are downloading a \u201cknockoff\u201d. Developers make these particularly alluring and intriguing to device users, as they are looking for any way to penetrate their device and to put their bad intentions into action.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The apps you\u2019re using may contain malware without you even knowing. Look into this today to protect yourself.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[195,210,259,182,545,249],"class_list":["post-16578","post","type-post","status-publish","format-standard","hentry","category-security","tag-app5","tag-apps","tag-hackers","tag-malware","tag-safety","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=16578"}],"version-history":[{"count":1,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16578\/revisions"}],"predecessor-version":[{"id":18001,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/16578\/revisions\/18001"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=16578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=16578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=16578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}