TechFake Chrome app on Android steals users' data and sends it to Russia

Fake Chrome app on Android steals users' data and sends it to Russia

Experts from AG Data have detected a fake Android application masquerading as the Google Chrome browser. Their observations indicate that the program is used to steal data, which ends up on servers in Russia. Analysts suggest what users should do.

An application pretended to be Google Chrome. In reality, it stole data.
An application pretended to be Google Chrome. In reality, it stole data.
Images source: © Getty Images | VALENTIN SUPRUNOVICH
Maria Glinka

3 June 2024 20:23

The users themselves discovered the fake application. Owners of smartphones based on Android were installing it from unofficial sources. Initially, everything worked without any issues, but specialists stepped in and had no doubt that the program could be dangerous.

Application pretending to be Google Chrome steals data

Cybersecurity experts from AG Data point out that the application looks almost identical to the original Google Chrome browser. However, after a thorough analysis, it was revealed that the program contained malicious code.

As a result, after installation, the application automatically gathered passwords, login data, and browsing history. Moreover, it could even access the microphone and camera, allowing cybercriminals to monitor users' activity in real time easily.

Analysts determined that the collected data was sent to servers in Russia.

Google has already been informed about this incident and assures that steps have been taken to remove the fake application. Besides, additional security measures have been implemented in the official Google Play store to prevent similar cases in the future.

How to protect yourself from dangerous applications?

Google recommends that users download applications only from trusted sources. Furthermore, it advises checking the permissions requested by the programs and using antivirus software.

Experts also emphasize regularly updating the operating system and applications. It is also essential to stay vigilant, as anyone can become a target for hackers anytime.

Related content
© Daily Wrap
·

Downloading, reproduction, storage, or any other use of content available on this website—regardless of its nature and form of expression (in particular, but not limited to verbal, verbal-musical, musical, audiovisual, audio, textual, graphic, and the data and information contained therein, databases and the data contained therein) and its form (e.g., literary, journalistic, scientific, cartographic, computer programs, visual arts, photographic)—requires prior and explicit consent from Wirtualna Polska Media Spółka Akcyjna, headquartered in Warsaw, the owner of this website, regardless of the method of exploration and the technique used (manual or automated, including the use of machine learning or artificial intelligence programs). The above restriction does not apply solely to facilitate their search by internet search engines and uses within contractual relations or permitted use as specified by applicable law.Detailed information regarding this notice can be found  here.