The malicious application popping up on the Google Play Store for Android devices is not a new problem. The latest from this was revealed only this week over the Lab52 report about the newly found threats contained in the Android application package that looks benign (APK). According to the report, malicious applications have the potential to connect with the Russian Turla hacking group, but Lab52 acknowledges that this spyware ability is beyond what the group is believed to be able.
The evil application was first found to connect with the application that did not appear to be related called “Roz Dhan: Get Cash Wallet.” Lab52 research shows that once a non-dangerous application is downloaded, the second application, (spyware), appears under the name “Process Manager,” complete with a gear-shaped icon to make it look more like an official setting-style application.
Evil applications can take control of the camera of Android devices, microphones, lock screen, storage encryption, and more. Given permission by users, the application icon associated with spyware can be lost and continues to run in the background while basically can control or monitor the device function from top to bottom, without peeking.
Calling him “complete control” is not really excessive, because the process list affected by the impact is very broad, according to Lab52. Evil applications can secretly record you through a camera or microphone, send your own messages, read text messages, listen to phone calls, and even read information from external devices that have been connected to your Android phone.