![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/f3c550c4f5c2a0d1ec944bf0a12db1f5.jpeg)
No one can ever imagine this level of disaster. Apparently a case of a fake Oximeter app that steals the banking credentials from the users. As indicated in the Karnataka DGP's tweet from last week, two identical apps that look like real oximeters and vaccine registration apps have been discovered. It was discovered that fake Oximeter apps were collecting user fingerprint information for Google Pay, PhonePe, Paytm, etc.
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/3e430e9bd071ea615a17b893c7246558.jpeg)
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
This application is made of the same stuff. It seems redundant for an app that would check oxygen saturation levels to seek contacts and SMS permission. It accesses contacts and uses SMS and WhatsApp to deliver links to every contact on the system. These links are hosted on some mega-account, which, when downloaded, reveals itself to be a banking Trojan banker.
Circulation trick
Malware developers frequently alter their tactics. One of the important elements for malware's success is distribution. The Google Play Store is the most widely used location for Android users to get both free and premium apps, thus it is where the useful target is. Malware developers employ a variety of tactics to get around Google Play Store restrictions.
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
The following are some of the techniques used to develop apps and distribute them through certain supplementary channels:
Before and after the app is deployed, authors use Firebase to start harmful operations. Given that Firebase is a Google product, its actions are less mysterious.
To distribute their payloads, authors use GitHub and mega accounts.
Other than Google Play, authors distribute their malware through other app stores and repositories, such as Koodous, QooApp, Huawei AppGallery, Apkpure, and many others. People that want specific apps removed from the Play Store visit repos like Apkpure, Apkmirror, and Koodous, where they run into malware.
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
How to protect yourself?
1. Always and always trust the authentic source before downloading the app. You must prefer the Google play store to download the app.
2. Never ever click on alien links that you might receive through messages, emails, or on any social media platform.
3. It’s advisable to take the right precaution and turn off installation from an unknown source.
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
Never ever download the app from any third-party app store.
Usually hackers or cyber criminals spoof the original application names as well as developers’ names. So you need to be alert. Ensure you are downloading the right app.
To protect your system, you must download some authentic security software and some antivirus software. Usually, people prefer K7 Antivirus software.
Conclusion
Keeping your system secure from all sorts of threats and crime is your responsibility. Protect your system with K7 Antivirus software and be safe and secure. You must install antivirus software on priority and for further assistance, you can connect with us.
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/9331d06b82790df83c7a71c645afe6d3.jpeg)
![](https://assets.isu.pub/document-structure/230213081008-e6406033a8483e742a8f33ac7ad654bc/v1/f3c550c4f5c2a0d1ec944bf0a12db1f5.jpeg)