The malicious application popping up on the Google Play Store for Android devices is not a new problem. The latest from this was revealed only this week over the Lab52 report about the newly found threats contained in the Android application package that looks benign (APK). According to the report, malicious applications have the potential to connect with the Russian Turla hacking group, but Lab52 acknowledges that this spyware ability is beyond what the group is believed to be able.
The malicious application popping up on the Google Play Store for Android devices is not a new problem. The latest from this was revealed only this week over the Lab52 report about the newly found threats contained in the Android application package that looks benign (APK). According to the report, malicious applications have the potential to connect with the Russian Turla hacking group, but Lab52 acknowledges that this spyware ability is beyond what the group is believed to be able.
The evil application was first found to connect with the application that did not appear to be related called “Roz Dhan: Get Cash Wallet.” Lab52 research shows that once a non-dangerous application is downloaded, the second application, (spyware), appears under the name “Process Manager,” complete with a gear-shaped icon to make it look more like an official setting-style application.
Evil applications can take control of the camera of Android devices, microphones, lock screen, storage encryption, and more. Given permission by users, the application icon associated with spyware can be lost and continues to run in the background while basically can control or monitor the device function from top to bottom, without peeking.
Calling him “complete control” is not really excessive, because the process list affected by the impact is very broad, according to Lab52. Evil applications can secretly record you through a camera or microphone, send your own messages, read text messages, listen to phone calls, and even read information from external devices that have been connected to your Android phone.
The best way to fight this special spyware form is not to provide software permission in the first place. In fact, this is a good basic practice to become very alert to applications that are downloaded from unknown sources – and sometimes sources are familiar, too – and always pay attention to any permission of the new application request at any time.
But if something like the harmful “process manager” software has been installed, and if it has been given the requested permission, deletion may still be an option – even though it has been activated, it will not appear as an ordinary application. According to Lab52 research, the “Process Manager” application will appear as an active process in your mobile notification bar, which will give you the opportunity to stop the function and delete it.
The other option you have is to open the settings for your Android phones and pull out anything that looks suspicious – and in this particular case it might not all appear under the title “Process Manager.” This method will not remove spyware, but it will cut it and basically make it useless – a decent short-term option, more carefully if you are worried about accidentally deleting important programs accidentally.
Open the settings, tap Privacy, tap the permit manager, and stop anything that looks suspicious. As a release of Google Android 11, your device should have technical capabilities to automatically reset permission for applications that you don’t use often – but you should be safe rather than regret.