Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 25 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Malicious Flappy Bird apps detected

by The Gurus
February 11, 2014
in Editor's News
Share on FacebookShare on Twitter

After the mobile application Flappy Bird was pulled by its creator, malicious versions are now being detected.
 
According to detections by Malwarebytes and Trend Micro, fake versions of Flappy Bird are spreading online. According to Malwarebytes, a free game has been detected not only for Android, but also for iOS. Malwarebytes security researcher Chris Boyd said that clicking the link took the user to surveys, which have now been taken down.
 
Boyd said that each clickable option took him to a mobile-centric sign-up page, where links typically required some form of mobile number sign up and/or payment to process.
 
“The Flappy Birds scam on the blog actually sits outside the iTunes store on this occasion – all of the clickable links take the end-user to various survey scam offers, and they all try to convince them to sign up to cash-draining mobile messages,” he told IT Security Guru.
 
“The scam on our blog is one that takes place in a standard web browser only, with the fake links (which lead users to the survey page) being posted to the IMVU groups page.”
 
Trend Micro said that the fake Flappy Bird apps have exactly the same appearance as the original version and all of the fake versions it had seen so far sent messages to premium numbers, thus causing unwanted charges to victims’ phone billing statements. After the game is installed and launched, the app will then begin sending messages to premium numbers.
 
Other fake versions have a payment feature added into the originally free app and, if the user refuses to pay, the app will close.
 
Creator Dong Nguyen originally gave no reason for taking the game down, saying via his Twitter page that he was taking it down as he could not “take this anymore”.
 
Michael Sutton, vice president of security research at Zscaler, said he was not surprised that there are malicious versions of Flappy Bird showing up on third party app stores, as malware authors constantly take advantage of popular games by posting cloned/malicious versions in third party app stores.
 
“In this case they have an even better angle – offering a desirable app that is no longer available. As we’ve often had to learn that hard way – ‘if it seems too good to be true…it probably is’,” he said.
 
Sutton said that he doubted that a malicious version would make its way into the official Google Play store, although it was very rare for cloned/malicious apps to appear in the Apple App store.
 
“How popular a malicious version would rank in a third party app store would depend upon how the store measures popularity, but without the need to compete with an official version of the app, the malware author would certainly have an opportunity to promote their cloned app without any official competition,” he said.

FacebookTweetLinkedIn
Tags: ApplicationmobileTrojan
ShareTweetShare
Previous Post

Safer Internet Day and Fight Back share 11th February

Next Post

PayPal President's credit card hacked for shopping spree

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information