Dangerous malware found on 8 Google Play Store apps that read your text messages! Checklist, remove now


A new malware named Autolycos has been detected on Google Play Store. It can read your text messages and secretly subscribe you to premium services.

Google has detected new malware on Google Play Store apps that secretly read users’ SMS messages and subscribe them to premium services. Around eight apps from the Google Play Store were infected with the malware called Autolycos. Alarmingly, although the tech giant banned most of these apps from the Play Store, they have already been downloaded over 3,000,000 times. As shared by Bleeping Computers, two of the infected apps are still active on the Play Store and having them on your phone could be dangerous for you. Here is the list of applications that have been detected with this new malware

8 Dangerous Google Play Store Apps Detected With Autolycos Malware

1. Vlog Star Video Editor (com.vlog.star.video.editor) – 1 million downloads

2. Creative 3D Launcher (app.launcher.creative3d) – 1 million downloads

3. Wow Beauty Camera (com.wowbeauty.camera) – 100,000 downloads

4. Gif Emoji Keyboard (com.gif.emoji.keyboard) – 100,000 downloads

5. Freeglow Camera 1.0.0 (com.glow.camera.open) – 5,000 downloads

6. Coco Camera v1.1 (com.toomore.cool.camera) – 1000 downloads

7. Funny Camera’ by KellyTech – Over 50,000 downloads

8. ‘Razer Keyboard & Theme’ by rxcheldiolola – Over 50,000 downloads

If you have downloaded any of these apps on your phone, delete it immediately as it may read your text messages and steal data. As shared by Evina security researcher Maxime Ingrao, these apps request permission to access users’ text messages after installation and when users grant permission, the malware reads SMS text messages and steals Datas. They sometimes even subscribe the device owner to premium services without letting them know.

Ingrao further shared that the malware performs stealth operations, executing website URLs on a remote browser and appending it in HTTP requests. This way, they hide themselves from being detected and hence undertake malicious activities on the device.


About Author

Comments are closed.