{"id":20978,"date":"2021-09-20T18:17:38","date_gmt":"2021-09-20T22:17:38","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20978"},"modified":"2022-04-27T14:00:38","modified_gmt":"2022-04-27T18:00:38","slug":"joker-malware-is-back-and-its-no-joke","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/joker-malware-is-back-and-its-no-joke\/","title":{"rendered":"Joker Malware is Back (And It\u2019s No Joke)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Old malware never dies \u2014 it just morphs into something more devious and dangerous \u2014 and this pattern is playing out with \u201cJoker\u201d malware, which was first identified in 2016. In 2021, it\u2019s back and more diverse and devious than ever.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">During the past few months, Joker has become one of the most active Android malware infections. Joker rides on the coat-tails of seemingly legitimate apps, then covertly signs up users for pricey subscription services. It can also steal SMS messages, contact lists, and device information.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Joker variations seem to arrive in batches, with a fresh batch leeching onto dozens of apps as recently as September.\u00a0<\/span><\/p>\n<p><b>Joker Infiltrates The App Store<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u201cOne of the best ways to avoid malware and trojan apps is to use Google\u2019s sanctioned app store,\u201d says Emilio Simoni, PSafe\u2019s dfndr lab Research Director, \u201cbut unfortunately, Joker has managed to disguise itself and mutate so profusely, that it has found its way on to several apps within the official Google Play marketplace. Of course third party app stores are also offering Joker-tainted apps \u2014 so the best protection is going to be a strong security app that sniffs out malware-tainted apps immediately, like our dfndr security Pro.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Google removes the offending apps as soon as they\u2019re reported \u2014 but the high rate of variation and concealment with this particular trojan keeps bringing new specimens on board.<\/span><\/p>\n<p><b>Delay Tactics<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u201cPart of what makes Joker so effective is that it waits to take effect,\u201d Simoni remarks. \u201cAfter the trojan-app is downloaded (many of these are knockoffs of better-known apps) it waits to drop a very small packet of code, it then reaches out to the server that loads the malware that does all the dirty work.\u201d\u00a0<\/span><\/p>\n<p><b>What Can You Do To Stay Safe?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Good hygiene with your digital devices includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Installing only the apps that you need and use. Loading up your device with as many apps as you can imagine using is a hazardous path.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Being wary. Look for apps from developers you know and trust.\u00a0 Do a little background checking and make sure that cool new app is coming from a known and trusted provider.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cleaning house periodically. To keep the number of apps you use to a minimum, do a periodic review of the apps on your phone and delete the ones you\u2019re not using.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u201cGood security habits are always the first step,\u201d Simoni observes, \u201cbut we can see that with truly devious malware like Joker, personal vigilance may not be enough.\u00a0 When a piece of malware is mutating on a monthly basis, you need a dedicated security solution to help keep you safe.\u201d\u00a0<\/span><\/p>\n<p><b>The Best Defense Begins BEFORE Dangerous Apps Are Downloaded<\/b><\/p>\n<p><span style=\"font-weight: 400;\">An excellent way to protect yourself is to use a security application like dfndr security Pro, which has a dedicated <\/span><b>Safe App<\/b> <b>Installer <\/b><span style=\"font-weight: 400;\">that can tell you if the app you\u2019re about to install has been identified as malware.\u00a0 This is exactly what the Safe App Installer does: it AUTOMATICALLY protects you from malware and apps known to compromise your data \u2014 before you even install them<\/span><b>.<\/b><\/p>\n<p><b>More Protection for Your Digital Life<\/b><\/p>\n<p><b>Safe App<\/b><span style=\"font-weight: 400;\"><strong> Installer<\/strong> is only one of the key features dfndr security Pro offers.\u00a0 It also comes with a full suite of security capabilities that can protect you not only from digital threats, but from thieves \u201cIRL\u201d as well.<\/span><\/p>\n<p><b>Beyond Safe App, there are four additional features dfndr security Pro offers to protect you and make your digital life easier:<\/b><\/p>\n<p><b>Anti-theft protection:<\/b><span style=\"font-weight: 400;\"> Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock\u00a0 it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.<\/span><\/p>\n<p><b>Privacy Protection: <\/b><span style=\"font-weight: 400;\">You can locate on a map where your app data is going and how it might be used by third-parties.<\/span><\/p>\n<p><b>Unlimited Identity Theft Reports:<\/b><span style=\"font-weight: 400;\"> These reports provide \u201cperimeter defense,\u201dlooking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 10 billion compromised credentials.\u00a0<\/span><\/p>\n<p><b>Ad-Free: <\/b><span style=\"font-weight: 400;\">As an extra bonus, Pro is totally ad-free.<\/span><\/p>\n<p><b>Get The Protection You Need Today<\/b><\/p>\n<p><a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_BR&amp;amp;c=joker-malware-is-back-and-its-no-joke\"><b>Click here <\/b><\/a><span style=\"font-weight: 400;\">to download dfndr security and free trial dfndr security Pro to put all of these features to work securing your phone, your data, and your digital life. dfndr security Pro offers a full suite of protection, constantly updated, to make sure \u201cyou\u2019re safe out there.\u201d<\/span><\/p>\n<p><a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_BR&amp;amp;c=joker-malware-is-back-and-its-no-joke\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20273 size-full\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Btn_EN.png\" alt=\"\" width=\"344\" height=\"63\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Btn_EN.png 344w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/05\/Btn_EN-300x55.png 300w\" sizes=\"auto, (max-width: 344px) 100vw, 344px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the past few months, Joker has become one of the most active Android malware infections.<\/p>\n","protected":false},"author":83,"featured_media":20979,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[12041,182,4460,249],"class_list":["post-20978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-dfndr-security","tag-malware","tag-news","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20978"}],"version-history":[{"count":3,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20978\/revisions"}],"predecessor-version":[{"id":21107,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20978\/revisions\/21107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20979"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}