Table of Contents
  • Home
  • /
  • Blog
  • /
  • Malicious BMI Calculator Spyware Discovered on Amazon Appstore
December 20, 2024
|
3m

Malicious BMI Calculator Spyware Discovered on Amazon Appstore


A person with short hair and a beard looks thoughtfully at their phone while sitting at a café table with notebooks and a coffee cup

McAfee Labs has uncovered a sophisticated malware disguised as a simple BMI calculator on the Amazon Appstore, revealing a dangerous app that can steal sensitive user information under the guise of a health tool.

The application, named "BMI CalculationVsn," appears harmless at first glance, offering users a straightforward interface to calculate their Body Mass Index. However, beneath its innocent exterior lies a complex set of malicious capabilities designed to compromise user privacy and device security.

Upon deeper investigation, researchers discovered the app performs several critical malicious activities. When users click the "Calculate" button, the Android system prompts for screen recording permissions. If granted, the app initiates a background service capable of capturing on-screen activities, potentially exposing gesture passwords and confidential data from other applications.

Beyond screen recording, the malware conducts comprehensive device surveillance. It systematically scans the device to retrieve a complete list of installed applications, which could be used for profiling users or planning more targeted attacks. Even more concerning is the app's ability to intercept and collect all incoming SMS messages, potentially capturing one-time passwords, verification codes, and other sensitive communications.

Interestingly, McAfee's analysis reveals that the app is still in its developmental stages. Historical samples trace its evolution from a basic screen recording tool to a more sophisticated malware, with SMS message stealing capabilities added in recent versions. The Firebase installation API's character "testmlwr" further suggests the app is in an active testing phase.

The developer is listed as "PT. Visionet Data Internasional," a name associated with a legitimate Indonesian enterprise IT management service provider. This strategic deception likely aims to build user trust and avoid immediate detection.

While Amazon has removed the app following McAfee's report, users who may have installed it are advised to take immediate action. Recommended steps include performing a full device scan, removing the application, and carefully reviewing app permissions for other installed software.

This incident underscores the evolving sophistication of mobile malware and the critical importance of vigilance when downloading applications. Users should:

  1. Only download apps from trusted publishers

  2. Carefully review requested permissions

  3. Maintain updated antivirus protection

  4. Be cautious of apps with minimal functionality

As mobile threats continue to become more deceptive, collaboration between cybersecurity researchers, app platforms, and users remains essential in creating a safer digital ecosystem.

Found this article interesting? Keep visit thesecmaster.com, and our social media page on FacebookLinkedInTwitterTelegramTumblrMedium, and Instagram and subscribe to receive tips like this. 

You may also like these articles: Here are the 5 most contextually relevant blog posts:

Anthony Denis

Anthony Denis a Security News Reporter with a Bachelor's in Business Computer Application. Drawing from a decade of digital media marketing experience and two years of freelance writing, he brings technical expertise to cybersecurity journalism. His background in IT, content creation, and social media management enables him to deliver complex security topics with clarity and insight.

Recently added

Learn More About Cyber Security Security & Technology

“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”

Cybersecurity All-in-One For Dummies - 1st Edition

"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.

Tools

Featured

View All

Learn Something New with Free Email subscription

Subscribe

Subscribe