From time to time, new malware is discovered, or in some instances, old malware can actually make a return. This is the case with the Joker malware that was initially discovered on Android devices back in 2017, and now according to the Belgian Police, it seems that the malware has returned.

For those unfamiliar, the Joker malware was discovered in 2017 where it embedded and hid within different Android apps. This malware had the ability to subscribe to payment services without the user’s knowledge, and in turn if you linked it up to a bank or a credit card, your funds would be drained very quickly.

According to the Belgian Police, cybersecurity company Quick Heat Security Lab has identified eight Android apps that the malware was hiding in. This includes:

  • Auxiliary Message
  • Element Scanner
  • Fast Magic SMS
  • Free CamScanner
  • Go Messages
  • Super Message
  • Great SMS
  • Travel Wallpapers

They also note that these apps have since been removed by Google, which is good as it means that it should prevent more users from downloading it. However, if you have already downloaded any of these apps, then you definitely want to delete it before it starts stealing all of your money.

That being said, other researchers such as Zscaler have also pointed out as many as 16 other apps that might also contain the malicious code. This includes:

  • Private SMS
  • Hummingbird PDF Converter – Photo to PDF
  • Style Photo Collage
  • Talent Photo Editor – Blur focus
  • Paper Doc Scanner
  • All Good PDF Scanner
  • Care Message
  • Part Message
  • Blue Scanner
  • Direct Messenger
  • One Sentence Translator – Multifunctional Translator
  • Mint Leaf Message-Your Private Message
  • Unique Keyboard – Fancy Fonts & Free Emoticons
  • Tangram App Lock
  • Desire Translate
  • Meticulous Scanner

It is possible that there might be more infected apps out there, but these are the ones currently identified and should probably be removed ASAP.

Filed in General. Read more about , and . Source: entrepreneur

Discover more from Ubergizmo

Subscribe now to keep reading and get access to the full archive.

Continue reading