CamScanner removed from Play Store due to malware

CamScanner removed from Play Store due to malware

CamScanner removed from Play Store due to malware

According to security firm Kaspersky Lab, the app itself is safe; the problem deals with a third-party advertising library on CamScanner that secretly installed malware on victims' phones.

Kaspersky notes that the app developers appeared to have removed the malicious code in more recent updates to the CamScanner app.

First things first, take a backup of the documents you have on CamScanner and then proceed to update the latest build of the app if it is installed on your device.

A Kaspersky study found malicious code inside CamScanner versions published between June and July.

According to the researchers, the app contained Trojan-Dropper.AndroidOS.Necro.n module in its recent versions, which is a Trojan dropper. But the simple fact that it was in there at all shows how hard - or, alternately, what a lousy job Google is doing - to keep malware out of the official Android app store. "That means the module extracts and runs another malicious module from an encrypted file included in the app's resources", the post read. CamScanner, an Android App with over 100M Downloads found with malicious files.

Apple has a much more stringent app review process, so it catches most malicious apps before they're on the App Store.

That's certainly possible. Many mobile apps have only limited control over where their ads come from, and malicious ad injection - "malvertising" - has plagued legitimate websites for many years.

Notably, the malware has only been found in the Android version of the app.

Although Google is certainly getting better at screening apps on its official Play store for malware, this is just the latest case highlighting persistent security concerns for Android users visiting the site.

While the developers might have removed the malware, the researchers warn that some versions of the app might still include the malware. CamScanner is now not available on Google Play, while the iOS version is still available in the Apple App Store.

The malware was capable of tracking users activity, providing intrusive adverts, signing users up to paid-for subscription services and even spreading to servers the smartphone or tablet was connected to.

Related news



[an error occurred while processing the directive]