Tuesday, 10 September 2019

DEVELOPERS FIXED CAMSCANNER AND THE APP IS BACK AT PLAY STORE

ORIGINAL CONTENT: https://www.securitynewspaper.com/2019/09/05/developers-fixed-camscanner-and-the-app-is-back-at-play-store/

According to information security services specialists, the new version of the CamScanner app is now available on the Google Play Store. As reported a few days ago, a team of researchers from security firm Kaspersky discovered that the app was infected with the AndroidOS.necro.n Trojan, so the developers removed the app from the platform for its “cleaning” and it’s back again.

This malware forced users to purchase a Premium subscription to the app, exposing victims to multiple financial cyberattacks. “Malware operators can abuse an infected smartphone by showing the victim fraudulent and intrusive advertising and even affect their bank accounts by arbitrarily charging subscriptions,” the information security services firm’s report mentioned.

This resulted in a media scandal that ruined the app’s reputation, forcing developers to delete the app from the Play Store. However, the company has announced that, after a thorough analysis and a strict debugging process, CamScanner is again available on Google’s official store in the form of version 5.12.5. “CamScanner is back on Google Play. Upgrade it to the new version and share the news with your friends; please, tell us you’re still here”, mentions a tweet from the app’s official account.

Despite the obvious security breaches committed by developers, many users have decided to reinstall the app: “I just downloaded the new version from their website. I could not help it, I guess I’m too used to this app and everyone deserves a second chance,” posted Twitter user @Vishwas_IN in response to the company’s announcement.

Dozens of users showed their support to CamScanner developers via Twitter, ensuring that they were confident that the app is, in effect, free from any cyber threat. However, some users expressed their displeasure at the decision of the developers, and Google, to host the app again in the official store. “Incidents like this end the trust of users. Why is it so easy to mention that it was all an accident and there are no longer security risks? Even other apps, such as Cleanmaster and Quickpic, have been caught trying to sell our data to third parties; I hope this is not the case,” the user @Kshitiz_Arora93 posted.

According to information security services specialists from the International Institute of Cyber Security (IICS), Trojans in mobile apps are one of the most common malware variants nowadays. Multiple groups of malicious hackers are dedicated to searching for vulnerable apps to infect them and easily generate revenue by either showing invasive advertising or redirecting victims to fraudulent websites.


0 comments:

Post a Comment