• Home
  • Apps
  • Apps News
  • Google Play Removes 25 Apps Caught Stealing Facebook Credentials From Users: Evina

Google Play Removes 25 Apps Caught Stealing Facebook Credentials From Users: Evina

Cyber-security firm, Evina notes that these 25 apps collectively had over 25 lakh downloads.

Google Play Removes 25 Apps Caught Stealing Facebook Credentials From Users: Evina

Photo Credit: Evina

Users' Facebook credentials were sent to a remote server

  • Most of the malicious apps offered wallpapers, video editing tools
  • Google removed these apps earlier in June
  • It is unclear how the apps avoided Google Play Protect detection

Google is said to have removed 25 apps from its Google Play store that were caught stealing Facebook credentials. According to the French cyber-security firm, Evina, these malicious apps collectively had over 25 lakh downloads. The apps reportedly offered different functionalities, though they used the same method for extracting users' credentials. Some of the apps had been available on the Google Play store for over two years before they were finally removed, the cyber-security firm highlighted.

The findings were published in a blog post by Evina and were first reported by ZDNet. Google removed the apps earlier in June after the cyber-security firm reported its potential threat in May this year. Most of these malicious apps offered new wallpapers, while others provided video editing tools and flashlight tools. Apps such as Super Wallpapers Flashlight and Padenatef had over 5 lakh downloads each on Google Play.

How did the apps steal Facebook credentials?

According to Evina, once the user launched the contentious app on their smartphone, the malicious app detected what app a user recently opened and had in the phone's foreground. "If it is a Facebook application, the malware will launch a browser that loads Facebook at the same time. The browser is displayed in the foreground which makes you think that the application launched it," the cyber-security firm explains.

Once the user put their Facebook login details on the phishing page (which features a black bar instead of a blue bar of the original Facebook app), the malicious then sent the credentials to a remote server. This could potentially allow attackers to access all data stored on the Facebook account or even allow them to access other websites where users' have logged in via their Facebook account.

Evina, however, has not clarified how these malicious apps avoided detection by Google's Play Protection service. The full list of these malicious Android apps is listed on Evina's website.

ZDNet citing the cyber-security firm notes that all of the 25 malicious apps were developed by a single threat group.

In 2020, will WhatsApp get the killer feature that every Indian is waiting for? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts or RSS, download the episode, or just hit the play button below.


For the latest tech news and reviews, follow Gadgets 360 on X, Facebook, WhatsApp, Threads and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. If you want to know everything about top influencers, follow our in-house Who'sThat360 on Instagram and YouTube.

Poco M2 Pro Launch Set for July 7, Quad Rear Camera Setup Confirmed
Share on Facebook Gadgets360 Twitter Share Tweet Snapchat Share Reddit Comment google-newsGoogle News


Follow Us


© Copyright Red Pixels Ventures Limited 2024. All rights reserved.
Trending Products »
Latest Tech News »