TechFake Chrome app on Android steals users' data and sends it to Russia

Fake Chrome app on Android steals users' data and sends it to Russia

An application pretended to be Google Chrome. In reality, it stole data.
An application pretended to be Google Chrome. In reality, it stole data.
Images source: © Getty Images | VALENTIN SUPRUNOVICH
Maria Glinka

3 June 2024 20:23

Experts from AG Data have detected a fake Android application masquerading as the Google Chrome browser. Their observations indicate that the program is used to steal data, which ends up on servers in Russia. Analysts suggest what users should do.

The users themselves discovered the fake application. Owners of smartphones based on Android were installing it from unofficial sources. Initially, everything worked without any issues, but specialists stepped in and had no doubt that the program could be dangerous.

Application pretending to be Google Chrome steals data

Cybersecurity experts from AG Data point out that the application looks almost identical to the original Google Chrome browser. However, after a thorough analysis, it was revealed that the program contained malicious code.

As a result, after installation, the application automatically gathered passwords, login data, and browsing history. Moreover, it could even access the microphone and camera, allowing cybercriminals to monitor users' activity in real time easily.

Analysts determined that the collected data was sent to servers in Russia.

Google has already been informed about this incident and assures that steps have been taken to remove the fake application. Besides, additional security measures have been implemented in the official Google Play store to prevent similar cases in the future.

How to protect yourself from dangerous applications?

Google recommends that users download applications only from trusted sources. Furthermore, it advises checking the permissions requested by the programs and using antivirus software.

Experts also emphasize regularly updating the operating system and applications. It is also essential to stay vigilant, as anyone can become a target for hackers anytime.

Related content