Be careful with the apps. There is a new complaint: cybersecurity experts from ESET have published a report where they tell how an android app went from being a simple app to record mobile screen to endanger thousands of users. As? Through malicious software.
The application seemed, at first glance, safe. And it even accumulated more than 50,000 downloads on Google Play. So how did it get there? She arrived healthy: the malicious code would have arrived after an update. As detailed, the application did not contain any code related to the Trojan at the time of being published on the Google Play Store in September 2021.
A year later came the unexpected
A year later, in 2022, the malicious code would have been introduced, capable of extract voice recordings captured with the microphone of the mobile. But that’s not the worst: it is also capable of gaining access to sensitive information stored on the device.
AhRat was the name of the malware that remained hidden in Google Play spying on Android users. The application, published on Google Play in 2019, had the name iRecorder – Screen Recorder.
AhRat, it is part of a espionage campaign about which not much is known so far. It is also unclear who is behind this specific threat.
After discovering the malware in the Google Play Store catalogue, from ESET they informed Google and the team in charge of the store has already removed iRecorder from the Play Store.