{"id":37299,"date":"2020-09-24T13:35:57","date_gmt":"2020-09-24T13:35:57","guid":{"rendered":"http:\/\/6d05ca8d-c6a9-454d-85eb-c37245e31235"},"modified":"2020-09-24T13:35:57","modified_gmt":"2020-09-24T13:35:57","slug":"mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/","title":{"rendered":"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/r\/2020\/09\/24\/165bfe7b-df67-48b2-bd03-21b60e4db339\/thumbnail\/770x578\/998ee4158b625501c1b4a9bf51124bef\/istock-worried-woman-using-a-smartphone.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Almost two and a half million Android and iPhone users downloaded seven adware apps from the Google Play Store and Apple App Store, according to research by a cybersecurity company.<\/p>\n<p>Many of the apps were being promoted via TikTok and Instagram accounts \u2013 one of which had over 300,000 followers. Detailed by <a href=\"https:\/\/blog.avast.com\/avast-discovers-47-android-adware-apps-avast\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">cybersecurity researchers at Avast<\/a>, the apps have been brought to the attention of Apple and Google.<\/p>\n<p>The apps themselves are all relatively simple \u2013 prank applications to &#8216;shock&#8217; friends, music downloaders and wallpaper apps, but they all aggressively display pop-ups which either outright charge users for using additional functions, or display adverts that take up the entire screen, requiring users to click on them to remove them. Both schemes generate revenue for those behind the apps.<\/p>\n<p>One of of the ways the apps have managed to bypass security protections of official Android and Apple app stores is because they&#8217;re <a href=\"https:\/\/www.zdnet.com\/article\/gaming-photo-apps-in-google-play-infect-android-handsets-with-malware\/\">HiddenAds trojans<\/a>, which while appearing legitimate to app store protections, push malicious functionalities from outside the application.<\/p>\n<p><strong><strong>SEE:&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.zdnet.com\/topic\/cybersecurity-lets-get-tactical\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><strong>Cybersecurity: Let&#8217;s get tactical<\/strong><\/strong><\/a><strong>&nbsp;<strong>(ZDNet\/TechRepublic special feature) |&nbsp;<\/strong><\/strong><a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/cybersecurity-let-s-get-tactical-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\"><strong><strong>Download the free PDF version<\/strong><\/strong><\/a><strong>&nbsp;<strong>(TechRepublic)<\/strong><\/strong><\/p>\n<p>That means the activity only emerges once the app has been installed by the user and the permissions provided enable the app to receive instructions from outside the app \u2013 which in this case is to display intrusive adverts and demand individual charges of up to $8 from users.<\/p>\n<p>&#8220;The apps we discovered are scams and violate both Google&#8217;s and Apple&#8217;s app policies by either making misleading claims around app functionalities, or serving ads outside of the app and hiding the original app icon soon after the app is installed,&#8221; said Jakub V\u00e1vra, threat analyst at Avast. &nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\"> <\/section>\n<p>The apps that have been removed from Google Play include T<em>hemeZone &#8211; Shawky App Free &#8211; Shock My Friends, Ulimate Music Downloader &#8211; Free Download Music.<\/em>&nbsp;Another set of apps including&nbsp;<em>Shock My Friends \u2013 Satuna<\/em>, <em>666 Time<\/em>, <em>ThemeZone &#8211; Live Wallpapers<\/em> and <em>shock my friend tap roulette v<\/em> are no longer available from the Apple App store in the UK.<\/p>\n<p>While adware, malware and other malicious apps can be difficult to identify, one way users can protect themselves is by not installing them in the first place and by carefully reading reviews of apps because low reviews and complains about functionality or excess charges could indicate something is wrong.<\/p>\n<p>Users should also be wary of apps which charge excessive amounts for basic features as it&#8217;s likely a sign that something isn&#8217;t right, while it&#8217;s also a good idea to check the permissions the app asks for, because asking for excessive access to the device could also be a sign that something isn&#8217;t right.<\/p>\n<p>The researchers note that one of the apps requests access to a device&#8217;s external storage, which can include photos, videos, and files, depending on how the storage is used. &#8220;Accessing external storage is not a must for a wallpaper app,&#8221; said V\u00e1vra. <\/p>\n<p>&#8220;So rather than just tapping &#8220;Allow,&#8221; the next time a new app asks for certain permissions, take a minute to think about whether or not it really needs that access. Does a weather app need to access your microphone? Nope. Does a wallpaper app need to access your storage? Nope. That&#8217;s a sign the app is likely a scam,&#8221; he added.<\/p>\n<p>Google told ZDNet that the offending apps have been removed from the store \u2013 although ZDNet has informed Google that at the time of writing one remains. Apple hasn&#8217;t responded to a request for comment.<\/p>\n<p><strong>READ MORE ON CYBERSECURITY<\/strong><\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at Avast detail adware being distributed via official app stores &#8211; with users being encouraged to download them via posts on TikTok and Instagram.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":37300,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-37299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-24T13:35:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users\",\"datePublished\":\"2020-09-24T13:35:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/\"},\"wordCount\":616,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/\",\"name\":\"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg\",\"datePublished\":\"2020-09-24T13:35:57+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/","og_locale":"en_US","og_type":"article","og_title":"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-24T13:35:57+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users","datePublished":"2020-09-24T13:35:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/"},"wordCount":616,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/","url":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/","name":"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg","datePublished":"2020-09-24T13:35:57+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/mobile-security-these-seven-malicious-apps-have-been-downloaded-by-2-4m-android-and-iphone-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobile security: These seven malicious apps have been downloaded by 2.4m Android and iPhone users"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37299"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/37300"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}