New iPhone, Android Warning—Do Not Use Any Of These Apps

Forbes - Feb 4th, 2025
Open on Forbes

A new cybersecurity warning has emerged for iPhone and Android users, as apps in both Google’s Play Store and Apple’s App Store have been found to contain malicious code capable of draining cryptocurrency wallets. The cybersecurity firm Kaspersky has identified that these infected applications use Optical Character Recognition (OCR) technology to scan device image galleries for sensitive information, such as wallet recovery phrases. This threat marks the first known case of this type of malware appearing in the Apple App Store, with over 242,000 downloads reported from Google Play alone. Apps like the ComeCome food delivery service in the UAE and Indonesia are among those affected. The attack's sophistication lies in its ability to remain hidden while operating and its international reach.

The implications of this discovery are significant, highlighting vulnerabilities in both major app distribution platforms. This evolution of malware targeting cryptocurrency wallets through OCR technology follows similar clipboard-stealing tactics previously reported by cybersecurity firm ESET. Users are advised to delete any identified infected apps and reinstall them only once they are confirmed safe. Kaspersky further advises against storing sensitive information like recovery phrases in easily accessible places like image galleries. This incident underscores the growing need for vigilance and advanced security practices in the digital landscape, especially concerning cryptocurrency management.

Story submitted by Fairstory

RATING

6.6
Fair Story
Consider it well-founded

The article provides a timely and largely accurate account of a significant cybersecurity threat affecting mobile device users. It effectively highlights the potential risks associated with malware-infected apps and offers practical advice for users to protect their data. However, the article could benefit from more balanced reporting by including responses from Google and Apple and additional expert opinions. While the primary source, Kaspersky, is reputable, the lack of corroborating sources or detailed methodologies limits the depth of analysis. The article's clarity is somewhat hindered by the inclusion of unrelated headlines, and its engagement potential could be enhanced by incorporating more interactive elements or personal stories. Overall, the article succeeds in raising awareness about an important issue but could improve in transparency and source diversity to provide a more comprehensive view.

RATING DETAILS

8
Accuracy

The story presents a largely accurate account of a cybersecurity threat involving malware in apps from both Google Play Store and Apple App Store. The claims about the malware's functionality, such as using OCR to scan image galleries for sensitive information, are supported by the cybersecurity firm Kaspersky, which is cited in the article. However, while the article accurately reports the number of downloads for the infected apps and the international spread of the threat, it lacks direct confirmation from Google and Apple regarding the status of the infected apps. The mention of the malware being the first of its kind in the App Store is a significant claim that is backed by Kaspersky's report, adding credibility to the story.

6
Balance

The article primarily presents the perspective of Kaspersky, the cybersecurity firm that discovered the malware. While it does mention that the author has reached out to Google and Apple for comments, it does not provide any responses from these companies, which could have added balance by offering their perspectives on how they are addressing the issue. The focus on the threat and potential consequences without counterbalancing viewpoints from other cybersecurity experts or the affected companies may lead to a somewhat one-sided narrative.

7
Clarity

The article is generally clear in its language and structure, making it relatively easy to follow for readers with a basic understanding of cybersecurity issues. It explains technical terms like OCR and malware in a straightforward manner. However, the inclusion of unrelated headlines within the article can be confusing and detracts from the main narrative. A more focused structure would improve clarity and comprehension.

7
Source quality

The primary source of information in the article is Kaspersky, a well-known and reputable cybersecurity firm, which lends credibility to the claims about the malware. However, the article does not mention other sources or corroborating experts, which could strengthen the overall reliability. The lack of responses from Google and Apple, despite being sought, leaves a gap in the full spectrum of perspectives needed for a comprehensive view.

5
Transparency

The article is transparent in attributing its main findings to Kaspersky, but it lacks detailed explanations of the methodology used by the firm to discover and analyze the malware. Additionally, the article does not clarify whether it has received any responses from Google or Apple, leaving readers uncertain about the current status of the apps. Greater transparency about the process of obtaining information and any potential conflicts of interest would enhance the article's credibility.

Sources

  1. https://bestofai.com/article/new-iphone-android-warningdo-not-use-any-of-these-apps
  2. https://investorshub.advfn.com/Wave-Systems-Corp-fka-WAVXQ-17
  3. https://appleworld.today/2024/12/fbi-cisa-says-iphone-android-users-shouldnt-text-each-other/
  4. https://beamstart.com/news/new-iphone-android-warningdo-not-17387131019843
  5. https://www.tomsguide.com/phones/android-phones/fbi-tells-iphone-and-android-users-to-stop-texting-each-other-amid-major-security-breach