Multiple 2FA Apps Distributing Malware Discovered in App Store and Google Play

[vc_row pix_particles_check=”” nav_skin=”light” consent_include=”include”][vc_column][vc_column_text]Recently, security experts have detected numerous 2FA applications developed to distribute malware on App Store and Google Play. Twitter recently announced that SMS-based two-factor authentication (2FA) is no longer secure enough. As a result, a change has occurred that requires certain users to switch to a different type of 2FA system. This change only affects users who select Twitter Blue, the platform’s premium service and purchase a verified Blue Badge to increase their access or tweet lengths[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”18136″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_column_text]A valid solution to meet Twitter’s new security requirements is to use a special 2FA (Authenticator) application that generates a unique one-time code sequence. These applications simplify the process by eliminating the need for users to download and install any additional software. Security researchers have analyzed several Authenticator applications on App Store and Google Play following the change, revealing that some applications jeopardize user data and security.[/vc_column_text][vc_empty_space height=”10px”][vc_single_image image=”18137″ img_size=”full” add_caption=”yes” alignment=”center”][vc_empty_space height=”10px”][vc_column_text]

Fake Applications on App Store and Google Play Have Subscription Plan Up-To $40

These applications are fake applications that resemble legitimate authentication applications and are designed to trick users into subscribing to a service that costs $40 a year. Some of the developers of these applications can obtain a code signing certificate by using the names of legitimate companies to make the applications appear legal and trustworthy.

The existence of these fake applications emphasizes the importance of careful evaluation when choosing an authentication application. Therefore, it is recommended to ensure the reliability of the used Authenticator applications and to pay attention to subscription payment requests and excessive advertising within the applications used in this context.[/vc_column_text][vc_empty_space][/vc_column][/vc_row]

Share This: