Close Menu
DISADISA
  • Home
  • News
  • Social Media
  • Disinformation
  • Fake Information
  • Social Media Impact
Trending Now

Promoting Factual Accuracy Through Media Literacy

September 10, 2025

Dissecting Health Misinformation: An LSHTM Perspective

September 10, 2025

Czech Republic Raises Concerns Over Potential Russian Cyber Interference in Upcoming Election

September 10, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
DISADISA
Newsletter
  • Home
  • News
  • Social Media
  • Disinformation
  • Fake Information
  • Social Media Impact
DISADISA
Home»Fake Information»Over 250 Malicious Applications Disseminate Information-Stealing Malware on Android and iOS Devices.
Fake Information

Over 250 Malicious Applications Disseminate Information-Stealing Malware on Android and iOS Devices.

Press RoomBy Press RoomJuly 24, 2025No Comments
Facebook Twitter Pinterest LinkedIn Tumblr Email

Mobile Malware Campaign Targets iPhone and Android Users with Extortion Threats

A new mobile malware campaign, dubbed SarangTrap, has been discovered, targeting both iPhone and Android users with over 250 malicious apps spread across more than 80 domains. Disguised as seemingly harmless utility apps, dating apps, file-sharing platforms, and car service apps, these malicious applications are designed to steal sensitive personal data, including contacts and photos, and then extort victims by threatening to leak their private information. The campaign primarily targeted users in South Korea, with many of the app names appearing in Korean. However, the potential for global impact is significant, as anyone could have inadvertently shared a link to one of the malicious domains. This underscores the importance of vigilance when downloading apps and highlights the ever-present threat of mobile malware.

The SarangTrap campaign employs sophisticated tactics to deceive users and bypass security measures. Potential victims are lured to carefully crafted phishing websites that mimic popular brands and app stores, lending an air of legitimacy to the malicious apps. Once installed, these apps present a polished user interface and request access to a multitude of unnecessary permissions, often claiming they are essential for functionality. To further enhance the illusion of exclusivity, particularly for the fake dating apps, users are prompted to enter an invitation code. This code is then sent to a hacker-controlled server, not for validation, but as a further step in the deception process. This seemingly innocuous step allows the malware to remain undetected by antivirus software and other security solutions.

Once the necessary permissions are granted, the true nature of the apps is revealed. Despite their initial polished appearance, they lack any real functionality. Instead, they serve as a gateway for hackers to infiltrate vulnerable devices and steal valuable data. The malware can extract a victim’s phone number, device identifiers, photos, and text messages. Armed with this information, the hackers can then extort victims by threatening to leak their private data to their contacts or online. The stolen data could also be sold to other cybercriminals for use in further attacks. Alarmingly, the campaign also targets iPhones using deceptive mobile configuration profiles, enabling the theft of similar sensitive data on iOS devices.

The SarangTrap campaign highlights the increasing sophistication of mobile malware and the importance of practicing safe app downloading habits. Users are advised to avoid sideloading apps or installing applications from unknown sources or websites. Any website attempting to directly install an app, rather than redirecting to an official app store like Google Play Store or Apple’s App Store, should be treated with extreme caution. Scrutinizing app permissions is also crucial. Be wary of apps requesting access to seemingly unrelated functionalities; for instance, a dating app requesting access to text messages is a significant red flag.

Limiting the number of apps installed on your phone is another recommended practice. A large number of apps makes it more difficult to identify malicious ones, and even legitimate apps can become compromised if injected with malicious code. Keeping a minimal number of apps reduces the potential attack surface. Android users should ensure that Google Play Protect is enabled, as this built-in security feature scans downloaded and existing apps for malware. For added protection, consider using a reputable Android antivirus app. While there isn’t a direct iPhone equivalent due to Apple’s restrictions, some Mac antivirus software can scan connected iPhones or iPads for malware.

Given the severe consequences of accidentally installing a malicious app, investing in identity theft protection services is a worthwhile consideration. These services can assist in recovering stolen identities and compensate for financial losses due to fraud or cyberattacks. Malicious apps remain a primary method for hackers to compromise devices and gain access to sensitive data. Therefore, proactive measures and cautious app downloading practices are essential for protecting personal information and mitigating the risks posed by this ever-evolving threat. Staying informed about the latest malware campaigns, like SarangTrap, is crucial for staying one step ahead of cybercriminals. Regularly reviewing installed apps and deleting any unused or unrecognized ones can further minimize the risk of falling victim to malicious software. Ultimately, user vigilance and a proactive approach to mobile security are the best defenses against the growing threat of mobile malware.

Share. Facebook Twitter Pinterest LinkedIn WhatsApp Reddit Tumblr Email

Read More

Vingroup Initiates Legal Action Against Social Media Influencers for Dissemination of False Information.

September 9, 2025

A Near-Complete History of “Fake News”

September 5, 2025

Global Rise in Social Media Manipulation, New Report Cautions

September 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Our Picks

Dissecting Health Misinformation: An LSHTM Perspective

September 10, 2025

Czech Republic Raises Concerns Over Potential Russian Cyber Interference in Upcoming Election

September 10, 2025

Moscow’s Deployment of Deepfakes in Turkish Media to Target Senator Lindsey Graham

September 9, 2025

Rescinding Australia’s Disinformation Legislation Would Be Detrimental.

September 9, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo

Don't Miss

News

Clarifying the Deployment of National Guard Troops to Chicago Under the Trump Administration

By Press RoomSeptember 9, 20250

Trump’s Chicago Intervention: A Looming Showdown Amidst Crime Concerns and Misinformation President Donald Trump’s persistent…

Canada’s Minister of Artificial Intelligence Must Recognize the Potential Harms of AI

September 9, 2025

Assessing the Impact of Misinformation and Disinformation on Achieving the Sustainable Development Goals within the Global Digital Compact Framework.

September 9, 2025

National Security and Defense Council of Ukraine Refutes Russian Disinformation Regarding “Language Patrols” in Schools

September 9, 2025
DISA
Facebook X (Twitter) Instagram Pinterest
  • Home
  • Privacy Policy
  • Terms of use
  • Contact
© 2025 DISA. All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.