Armenia Technology Press
SEE OTHER BRANDS

Fresh news on science and technology in Armenia

Anomali Threat Research Detects Fake COVID-19 Contact Tracing Apps Spreading Malware

Cybercriminals Target Android to Steal Personal Information and Monitor Devices

REDWOOD CITY, Calif., June 10, 2020 (GLOBE NEWSWIRE) -- Anomali, a provider of intelligence-driven cybersecurity solutions, today announced that threat actors are using fake COVID-19 contact tracing apps to infiltrate Android devices. After being downloaded, the apps install malware that can be used to steal data and conduct device surveillance. Governments around the world are working with app developers to provide legitimate COVID-19 tracing apps as part of their efforts to reduce the spread of the virus that is causing the global pandemic. Because contact tracing app programs are in widespread use and highly publicized, the likelihood that threat actors will try and capitalize on government programs will continue to increase.

The Anomali Threat Research (ATR) team identified 12 fake apps targeting citizens in Armenia, India, Brazil, Chhattisgarh, Columbia, Indonesia, Iran, Italy, Kyrgyzstan, Russia, and Singapore. The fake health-surveillance apps are downloading Anubis and SpyNote malware, and other instances of generic malware. Anubis is an Android banking trojan that utilizes overlays to access infected devices and then steal user credentials. SpyNote is an Android trojan used for gathering and monitoring data on infected devices. We believe the threat actors are distributing the malicious apps via other apps, third-party stores, and websites, among other channels.

Anomali Threat Research emphasizes that public and private sectors should use technology to assist in handling the crisis wherever possible, adding that we cannot overlook the fact that technology creates risk. Cybersecurity concerns must be addressed, as this research shows that threat actors are attempting to capitalize on these technology initiatives for malicious purposes.

The full findings are available on our blog, which includes images of the fake apps that have been detected.

In addition to this research, Anomali has identified more than 6,000 COVID-19 Indicators of Compromise (IOCs) that flooded the internet in the days following emergence of the pandemic. These are available to our customers via their licenses and open sourced to the security community.

About Anomali
Anomali® delivers intelligence-driven cybersecurity solutions, these include Anomali ThreatStream®, Anomali Match, and Anomali Lens. Private enterprises and public organizations use Anomali to gain unlimited visibility, speed time to detection, and constantly improve security operations. Anomali customers include more than 2,300 global organizations, many of the Global 2000 and Fortune 500, and large government and defense organizations around the world. Founded in 2013, it is backed by leading venture firms including GV, Paladin Capital Group, Institutional Venture Partners, and General Catalyst. Learn more at: www.anomali.com

News Contact
Joe Franscella
jfranscella@anomali.com

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/acfbaf33-cb9e-4c2b-82e9-eea032ce1014

Primary Logo

Fake COVID-19 Contact Tracing Apps

Anomali Threat Research identified fake COVID-19 contact tracing apps used to install malware that monitors devices and steals personal data. This graphic show the Arrogya Setu app that is believed to be targeting Android users in India.

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Share us

on your social networks:
AGPs

Get the latest news on this topic.

SIGN UP FOR FREE TODAY

No Thanks

By signing to this email alert, you
agree to our Terms of Service