Tag: discovered

  • Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

    Screenshot-scanning malware discovered on Apple App Store in first-of-its-kind attack

    Every tech expert will tell you the App Store is safer than Google Play Store. Some might even claim it is impossible to download a malicious app from the App Store, but they are wrong. 

    While I admit the App Store is a secure and tightly controlled ecosystem, it cannot completely shield you. Security researchers have found that hackers are targeting several apps on the App Store to spread malware that steals information from screenshots saved on a device. 

    The issue also affects those downloading apps from the Google Play Store.

    STAY PROTECTED & INFORMED! GET SECURITY ALERTS & EXPERT TECH TIPS — SIGN UP FOR KURT’S THE CYBERGUY REPORT NOW

    A person holding an iPhone. (Kurt “CyberGuy” Knutsson )

    How the malware works and what makes it different

    According to researchers at Kaspersky, this malware campaign is more advanced than typical info stealers, both in how it works and how it spreads. Instead of relying on social engineering tricks to get users to grant permissions like most banking trojans or spyware, this malware hides inside seemingly legitimate apps and slips past Apple and Google’s security checks.

    One of its standout features is Optical Character Recognition. Instead of stealing stored files, it scans screenshots saved on the device, extracts text and sends the information to remote servers.

    Once installed, the malware operates stealthily, often activating only after a period of dormancy to avoid raising suspicion. It employs encrypted communication channels to send stolen data back to its operators, making it difficult to trace. Plus, it spreads through deceptive updates or hidden code within app dependencies, an approach that helps it evade initial security screenings by app store review teams.

    The infection vectors vary between Apple and Google’s ecosystems. On iOS, the malware is often embedded within apps that initially pass Apple’s rigorous review process but later introduce harmful functionality through updates. On Android, the malware can exploit sideloading options, but even official Google Play apps have been found to carry these malicious payloads, sometimes hidden within SDKs (software development kits) supplied by third-party developers.

    Messaging app

    Messaging app in the App Store designed to lure victims.

    THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION

    What’s being stolen, and who’s responsible?

    The scope of stolen information is alarming. This malware primarily targets crypto wallet recovery phrases but is also capable of exfiltrating login credentials, payment details, personal messages, location data and even biometric identifiers. Some versions are designed to harvest authentication tokens, allowing attackers to access accounts even if users change their passwords.

    The apps serving as malware carriers include ComeCome, ChatAi, WeTink, AnyGPT and more. These range from productivity tools to entertainment and utility apps. In some cases, malicious developers create these apps with full knowledge of the malware’s purpose. In others, the issue appears to be a supply chain vulnerability, where legitimate developers unknowingly integrate compromised SDKs or third-party services that introduce malicious code into their applications.

    We reached out to Apple for a comment but did not hear back before our deadline. 

    App Store

    Messaging app in the App Store designed to lure victims. (Kaspersky)

    Apple’s response to screenshot-scanning malware discovered in App Store

    Apple has removed the 11 iOS apps mentioned in Kaspersky’s report from the App Store. Furthermore, they discovered that these 11 apps shared code signatures with 89 other iOS apps, all of which had been previously rejected or removed for violating Apple’s policies, resulting in the termination of their developer accounts.

    Apps requesting access to user data such as Photos, Camera or Location must provide relevant functionality or face rejection. They must also clearly explain their data usage when prompting users for permission. iOS privacy features ensure users always control whether their location information is shared with an app. Also, starting in iOS 14, the PhotoKit API — which allows apps to request access to a user’s Photos library — added additional controls to let users select only specific photos or videos to share with an app instead of providing access to their entire library. 

    The App Store Review Guidelines mandate that developers are responsible for ensuring their entire app, including ad networks, analytics services and third-party SDKs, complies with the guidelines. Developers must carefully review and choose these components. Apps must also accurately represent their privacy practices, including those of the SDKs they use, in their privacy labels.

    In 2023, the App Store rejected over 1.7 million app submissions for failing to meet its stringent privacy, security and content standards. It also rejected 248,000 app submissions found to be spam, copycats or misleading and prevented 84,000 potentially fraudulent apps from reaching users.

    WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

    What Google is doing to stop malware 

    A Google spokesperson tells CyberGuy: 

    “All of the identified apps have been removed from Google Play and the developers have been banned. Android users are automatically protected from known versions of this malware by Google Play Protect, which is on by default on Android devices with Google Play Services.”

    However, it is important to note that Google Play Protect may not be enough. Historically, it isn’t 100% foolproof at removing all known malware from Android devices. Here’s why:

    What Google Play Protect can do:

    • Scans apps from the Google Play Store for known threats.
    • Warns you if an app behaves suspiciously.
    • Detects apps from unverified sources (sideloaded APKs).
    • Can disable or remove harmful apps.

    What Google Play Protect can’t do:

    • It does not provide real-time protection against advanced threats like spyware, ransomware or phishing attacks.
    • It does not scan files, downloads or links outside of Play Store apps.
    • It may miss malware from third-party app stores or sideloaded apps.
    • It lacks features like VPN protection, anti-theft tools and privacy monitoring.
    password

    Image of a person typing in their password on screen. (Kurt “CyberGuy” Knutsson)

    HOW SCAMMERS USE YOUR PERSONAL DATA FOR FINANCIAL SCAMS AND HOW TO STOP THEM

    5 ways users can protect themselves from such malware

    1. Use strong antivirus software: Installing strong antivirus software can add an extra layer of protection by scanning apps for malware, blocking suspicious activity and alerting you to potential threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

    2. Stick to trusted developers and well-known apps: Even though malware has been found in official app stores, users can still minimize their risk by downloading apps from reputable developers with a long track record. Before installing an app, check its developer history, read multiple reviews and look at the permissions it requests. If an app from an unknown developer suddenly gains popularity but lacks a strong review history, approach it with caution.

    GET FOX BUSINESS ON THE GO BY CLICKING HERE

    3. Review app permissions carefully: Many malicious apps disguise themselves as legitimate tools but request excessive permissions that go beyond their stated purpose. For example, a simple calculator app should not need access to your contacts, messages or location. If an app asks for permissions that seem unnecessary, consider it a red flag and either deny those permissions or avoid installing the app altogether. Go to your phone settings and check app permissions on your iPhone and Android

    4. Keep your device and apps updated: Cybercriminals exploit vulnerabilities in outdated software to distribute malware. Always keep your operating system and apps updated to the latest versions, as these updates often contain critical security patches. Enabling automatic updates ensures that you stay protected without having to manually check for new versions.

    5. Be wary of apps that promise too much: Many malware-infected apps lure users by offering features that seem too good to be true — such as free premium services, extreme battery optimizations or AI-powered functionality that appears unrealistic. If an app’s claims sound exaggerated or its download numbers skyrocket overnight with questionable reviews, it’s best to avoid it. Stick to apps with a transparent development team and verifiable functionalities. 

    HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

    Kurt’s key takeaway

    The new malware campaign highlights the need for stricter vetting processes, continuous monitoring of app behavior post-approval and greater transparency from app stores regarding security risks. While Apple and Google have removed the malicious apps upon detection, the fact that they made it onto the platform in the first place exposes a gap in the existing security framework. As cybercriminals refine their methods, app stores must evolve just as quickly or risk losing the trust of the very users they claim to protect.

    CLICK HERE TO GET THE FOX NEWS APP

    Do you think app stores should take more responsibility for malware slipping through? Let us know by writing us at Cyberguy.com/Contact

    For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

    Ask Kurt a question or let us know what stories you’d like us to cover.

    Follow Kurt on his social channels:

    Answers to the most-asked CyberGuy questions:

    New from Kurt:

    Copyright 2025 CyberGuy.com. All rights reserved.

  • Newly discovered asteroid turns out to be Tesla Roadster launched into space

    Newly discovered asteroid turns out to be Tesla Roadster launched into space

    Elon Musk’s sense of humor is out of this world. 

    Seven years after the SpaceX CEO launched a Tesla Roadster into orbit, astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics in Massachusetts confused it with an asteroid earlier this month. 

    A day after the astronomers with the Minor Planet Center registered 2018 CN41, it was deleted on Jan. 3 when they revealed that it was in fact Musk’s roadster. 

    The center said on its website that 2018 CN41’s registry was deleted after “it was pointed out the orbit matches an artificial object, 2018-017A, Falcon Heavy Upper stage with the Tesla Roadster. The designation2018 CN41 is being deleted and will be listed as omitted.”

     DEBRIS FROM SPACEX STARSHIP STREAKS THROUGH THE SKY

    Seven years after the SpaceX CEO launched a Tesla Roadster into orbit, astronomers from the Minor Planet Center at the Harvard-Smithsonian Center for Astrophysics in Massachusetts confused it with an asteroid earlier this month.  (SpaceX via Getty Images)

    SpaceX launched the Tesla Roadster on the maiden flight of SpaceX’s huge Falcon Heavy rocket in February 2018. 

    The roadster was expected to go into elliptical orbit around the sun, going a little beyond Mars and back toward Earth, but it apparently exceeded the orbit of Mars and kept going to the asteroid belt, according to Musk at the time. 

    SpaceX launch with Tesla Roadster

    SpaceX launched the Tesla Roadster on the maiden flight of SpaceX’s huge Falcon Heavy rocket in February 2018.  (Jim Watson/AFP via Getty Images))

    When the roadster was mistaken for an asteroid earlier this month, it was less than 150,000 miles from Earth, which is closer than the moon’s orbit, according to Astronomy Magazine, meaning that astronomers would want to monitor how close it gets to Earth. 

    POWERFUL WEBB TELESCOPE CAPTURES PHOTOS OF ONE OF THE EARLIEST SUPERNOVA EVER SEEN

    Center for Astrophysics (CfA) astrophysicist Jonathan McDowell told Astronomy magazine that the mistake shows the issues with untracked objects. 

    Elon Musk

    Elon Musk’s SpaceX launched his former personal car into orbit at the time.  (Justin Sullivan)

    “Worst case, you spend a billion launching a space probe to study an asteroid and only realize it’s not an asteroid when you get there,” he said.

    CLICK HERE TO GET THE FOX NEWS APP

    Fox News Digital has reached out to SpaceX for comment. 

  • Glowing sea slug nicknamed ‘mystery mollusk’ discovered in deep ocean

    Glowing sea slug nicknamed ‘mystery mollusk’ discovered in deep ocean

    Researchers have discovered a new species of glowing sea slug deep in the ocean’s midnight zone.

    Monterey Bay Aquarium Research Institute (MBARI) scientists said in a press release on Tuesday that while Bathydevius caudactylus is classified as a sea slug, it was nicknamed the “mystery mollusk” because the creature was unlike any other that’s been encountered before.  

    The mystery mollusk’s genus name, Bathydevius, is a play on the deep-sea animal’s “devious” nature that fooled researchers, the researchers said.

    Bathydevius is the first nudibranch, or sea slug, known to live in the deep sea. The sea slug’s body is made up of a large gelatinous hood and paddle-like tail. It can glow with bioluminescence. 

    A LOOK AT THE WORLD’S LONGEST SNAKE WHICH MEASURES OVER 32 FEET, A RECORD-BREAKING SLITHERING SERPENT

    Bathydevius caudactylus is classified as a sea slug. (MBARI)

    It lives at an extreme depth of 1,000 to 4,000 meters, or 3,300 to 13,100 feet, below the surface in the ocean’s midnight zone, creating a unique challenge for scientists who’ve worked for decades to catalog the mysterious animal.

    “We’ve invested more than 20 years in understanding the natural history of this fascinating species of nudibranch,” said MBARI Senior Scientist Bruce Robison. “Our discovery is a new piece of the puzzle that can help better understand the largest habitat on Earth.”

    bathydevius caudactylus

    Bathydevius caudactylus can glow with bioluminescence, an ability that researchers say is to deter predators in the deep sea. (MBARI)

    Researchers found that Bathydevius evolved to find unique ways to survive in its environment.

    It uses a cavernous hood to trap crustaceans “like a Venus fly trap plant,” like some jellies, anemones and tunicates. The mysterious creature also hides from predators in plain sight, taking advantage of its transparent body. 

    FIRST EMPEROR PENGUIN KNOWN TO REACH AUSTRALIA FOUND ALIVE ON TOURIST BEACH

    If it feels threatened, however, the sea slug will light up with bioluminescence to deter and distract hungry predators. Researchers once observed the creature illuminate and detach a “a steadily glowing finger-like projection from the tail, likely serving as a decoy to distract a potential predator.”

    bathydevius caudactylus

    Bathydevius caudactylus is believed to release its eggs on the seafloor. (MBARI)

    Bathydevius, like other nudibranchs, is a hermaphrodite, having both male and female sex organs. Researchers said that the animal will descend to the seafloor to spawn, using their muscular foot to anchor to the muddy seafloor before releasing their eggs.

    MBARI scientists said that it was only thanks to the facility’s advanced underwater technology that they were able to compile the most comprehensive description of any deep-sea creature to date.

    CLICK TO GET THE FOX NEWS APP

    “What is exciting to me about the mystery mollusk is that it exemplifies how much we are learning as we spend more time in the deep sea, particularly below 2,000 meters,” said MBARI Senior Scientist Steven Haddock. “For there to be a relatively large, unique, and glowing animal that is in a previously unknown family really underscores the importance of using new technology to catalog this vast environment.”