deceptive nature

AppWizard
November 26, 2025
A new malware called Sturnus spreads through sideloaded APKs and can steal chats, banking information, and control devices. It reads decrypted chats, creates fake banking overlays, and can remotely access Android devices. Sturnus disguises itself with fake Android update screens, and users in Europe have already fallen victim to it. The malware is primarily spread through attachments sent via messaging applications and exploits Accessibility settings to read screen content and impose overlays on banking applications. Google has not detected this malware in the Google Play Store, thanks to Play Protect's scanning efforts. Users are advised to exercise caution when downloading APKs.
AppWizard
August 12, 2025
LunaSpy is an Android spyware that has been circulating since February 2025, primarily infiltrating devices through messaging platforms like Telegram. It disguises itself as a legitimate antivirus or banking protection app, tricking users into granting extensive permissions by initiating a fake virus scan and presenting false notifications of threats. Once installed, LunaSpy can steal passwords from browsers and messaging apps, record audio and video, access text messages, track geographical location, and execute commands on the device. The spyware also contains dormant code that may allow it to steal photos in future updates. Data collected by LunaSpy is sent to attackers via around 150 servers. Users are advised against downloading APKs from links shared through messaging apps and should uninstall any unfamiliar antivirus applications that request extensive access to their devices.
AppWizard
June 19, 2025
Check Point researchers have discovered a malware campaign targeting Minecraft users, utilizing a distribution-as-a-service model called Stargazers. This malware, disguised as cheat tools, employs Java and .NET stealers to compromise player systems. The attackers have been active since March 2025, using GitHub repositories that appear to offer legitimate mods but contain malicious JAR files. The infection process begins with the installation of a compromised JAR file, which triggers a multi-stage attack that extracts sensitive data from Minecraft and Discord, as well as broader information like browser credentials and cryptocurrency wallet details. The malware is linked to Russian-speaking threat actors, and the Stargazers Ghost Network is identified as the distributor. The report highlights the need for caution when downloading third-party content in gaming communities.
AppWizard
April 25, 2025
A game called R.E.P.O Horror was released on the Nintendo eShop, misleading players into believing it was the authentic PC game R.E.P.O. Users reported that R.E.P.O Horror was of low quality and not published by the original developer, Semiwork. This incident is part of a broader trend of intellectual property infringement, as seen with other titles like The Backrooms 1998 and games such as TCG Card Shop Simulator, Only Up!, and Chained Together, which closely resemble their original versions. Consumers are advised to verify developer and publisher details before purchasing games on the Nintendo eShop to avoid counterfeit products. The original R.E.P.O game remains a reputable option in the co-op horror genre, with plans for future enhancements.
AppWizard
December 25, 2024
A recent alert from McAfee has raised concerns for Android users regarding a health application called BMI CalculationVsn available on Amazon's Appstore. This app, which appears to be a simple Body Mass Index calculator, is capable of recording on-screen activity, accessing private SMS messages, and scanning devices for sensitive information. McAfee discovered that the app secretly steals the package names of installed apps and incoming SMS messages. Following this discovery, McAfee alerted Amazon, which removed the app from its platform. Users who have downloaded the app are advised to uninstall it immediately. McAfee emphasizes the importance of vigilance in digital security, recommending that Android users install reliable antivirus software and carefully review permission requests from apps. Users should also be aware of unusual app behavior, such as decreased device performance, rapid battery drain, and unexpected spikes in data usage, which may indicate malicious activity.
AppWizard
December 23, 2024
McAfee's security team discovered a malicious app named "BMI CalculationVsn" in Amazon's Android Appstore, which pretended to be a health tracker but was capable of screen recording, password theft, and accessing private SMS messages. Following the report, Amazon removed the app from its platform, and users who downloaded it are advised to uninstall it immediately. McAfee recommends that Android users install reliable antivirus software, scrutinize permission requests before downloading apps, and monitor app behavior for unusual activity to enhance their security.
AppWizard
November 28, 2024
Recent findings from cybersecurity firm McAfee identified 15 malicious loan applications with around 8 million downloads that are designed to steal personal and financial data. These apps, found on platforms like the Google Play Store, mimic legitimate financial services and primarily target Android users in regions such as South America, Southern Asia, and Africa. Users are advised to remove specific apps, including "Préstamo Seguro-Rápido," "Préstamo Rápido-Credit Easy," and others, which promise quick loans but are actually tools for data harvesting. Victims report receiving partial funds and facing aggressive repayment demands, with some apps sharing a common infrastructure for data exfiltration. Key indicators of malicious intent include poor app ratings, excessive permission requests, and the legitimacy of the developer. Staying updated with software patches is also recommended to protect against these threats.
Search