Joker Malware Floods Android Apps
The Joker Trojan has found its way back on the Google Play store, in the form of malicious Android applications with the ability of hiding the billing-fraud malware, and from research findings is also using some new approaches to evade the Google’s app vetting process (Goodin, 2020).
How the Joker Trojan operates
The Trojan steals victim’s information from their devices via Short Message Services (SMS messages), contact list, and through device information. This malware usually disguises itself within common, legitimate apps like camera apps, games, messengers, photo editors, translators, and wallpapers. After the Trojan has
sneaked into the victim’s device, it silently interacts
with advertisement websites and subscribes the victim unknowingly to premium payment services controlled
by hackers. This type of billing fraud is categorized by researchers as “fleeceware.”