Over 250 Malicious Apps Steal Your Data on Android and iOS: Delete Them Now

Over 250 apps available on both Android and iOS have been found to contain malicious code designed to steal users’ personal information. Security experts urge smartphone owners to check their devices immediately and remove these compromised applications to protect their data.
Tl;dr
A New Wave of Mobile Attacks: The « SarangTrap » Threat
Amid a rapidly evolving digital landscape, cybersecurity firm Zimperium has recently raised concerns about a particularly ambitious campaign dubbed SarangTrap. This operation, far from being restricted to a local scale, has impacted users of both Android and iPhone devices worldwide—though it began by targeting South Korea specifically. What makes this threat remarkable is not just its scope but also the degree of sophistication employed: more than 250 infected applications, spread across over 80 fraudulent domains, have been meticulously crafted to mimic legitimate services. These fake apps present themselves as everything from productivity tools to dating platforms and file-sharing utilities, often boasting polished interfaces that belie their malicious intent.
Anatomy of a Deceptive Attack
The modus operandi behind SarangTrap reveals a calculated approach. Victims are lured to near-identical copies of reputable sites or well-known brands. Upon installing one of these seemingly innocuous apps, users are prompted for an invitation code—a supposed mark of exclusivity—which is immediately dispatched to servers controlled by attackers. Here lies the first critical vulnerability. The software then requests intrusive permissions, such as access to contacts, messages, and photos.
Should a user comply with these requests, the consequences can be severe. Sensitive details—ranging from phone numbers and device identifiers to private chats and personal photos—are systematically extracted. In some alarming instances, perpetrators have escalated their tactics to extortion, threatening victims with the publication of compromising content unless a ransom is paid. Notably, this method is not limited by platform: iPhone users can fall prey through a malicious configuration profile with similar efficiency.
Identifying Malicious Apps: Key Red Flags
Cybersecurity experts have flagged several suspicious app names that should immediately raise concerns. To enhance user awareness, here are some examples identified in recent reports:
Most bear Korean-language titles—an echo of their original target demographic—but exposure remains possible for anyone clicking on suspect links worldwide.
Staying One Step Ahead: Essential Precautions
Adopting robust habits can mitigate much of this risk. Prioritize installations exclusively from official app stores like the Google Play Store or App Store, scrutinize any unusual permission requests, and keep your roster of installed apps lean for easier monitoring.
For added protection:
– Activate Google Play Protect if you use Android.
– Consider trusted antivirus solutions.
– On iOS devices, run periodic scans via computer.
– In case of breach, explore identity theft protection options.
Ultimately—and perhaps unsurprisingly—the best defense remains ongoing vigilance coupled with critical selection when downloading new applications. As cyber threats continue to evolve, so must our awareness and response.