Published on July 9th, 2015 📆 | 2935 Views ⚑


Zscaler revealed fake battery application used for malware attacks

An App can be a spoof and the worst part is, it is a battery monitoring application which is a fake and people can easily find it on google play storeZscaler is a revolutionizing Internet safety against malware, viruses, advanced persistent threats and other risks. Zscaler has revealed presence of this application which is a fake battery app.

Zscaler protects employees from malware, viruses, advanced persistent threats and other risks and can also stop accidental or malicious leaks of company’s sensitive data. Zscaler has spoiled app spoofing as it discovered the fake battery monitoring app initially present on google app store which the developer is using to fool around people.

[adsense size='1']

Google’s acclaimed Bouncer app screening system also passed this application stated to be fake. Battery bot which is the fake app has a battery indicator that is a collection of compromised devices involved in click fraud, ad fraud, and premium SMS scams. The Battery bot is very mischievous in dealing data stored in phone as reckoned by Zscaler.

BatteryBot is now unavailable at Google play and now it is offered for free and Battery Bot pro comes with a price tag of about US $2.84 and once you download this application or install it , the approval standards will give you an idea about what actual is it.

[adsense size='1']

As in access acceptance confirmation, this BatteryBot ask for information access like memory, IMEI, carrier, Location, language, phone model, SIM card availability. The background activity included many false ad libraries and they have been marked with red flags to notify that this fake app is actually seeking for administrative control over mobile device.

Zscaler also noticed behavior for such fraud applications which is they are difficult to uninstall with admin privileges, the uninstall process is very frustrating as this app gets installed through surviving threads. This is done by a package which is named as com.nb.superuser . The only way out is to go to the roots of the phone and kill the malware.

[adsense size='1']

The past SMS fraud case happened through the similar app where that malicious application retrieved premium SMS numbers from phone and the people behind that malware or application would use that number till the time it gets cancelled by carrier in scam case.

Tagged with:

Comments are closed.