CamScanner makes a comeback after Google removed it for having malware – DigitalMunition




Hacking News CamScanner makes a comeback after Google removed it for having malware

Published on September 6th, 2019 📆 | 6588 Views ⚑

0

CamScanner makes a comeback after Google removed it for having malware

The popular PDF creator app CamScanner is now back on Google Play and Android smartphone users are free to download it. The app was removed by
Google for having a malicious module. The iOS version of the app was not affected by this. The developers of CamScanner took to Twitter to announce their comeback. In a statement, the app developers said that all advertising SDKs are removed from the app in the latest version. CamScanner version 5.12.5 is now available for download and users are recommended that they upgrade soon.

Last week, researchers at Internet security firm Kaspersky Labs had unearthed a malware in the CamScanner app following which Google had removed the app from its official app store–Google Play. Note that CamScanner app is not a malware in itself. It is a completely legit Android app. However, researchers had found a problem with the earlier version of the app.

“Recent versions of the app shipped with an advertising library containing a malicious module,” Kaspersky researchers claimed. They also claimed that the CamScanner app had a module called “Trojan-Dropper.AndroidOS.Necro.n”. “The module is a Trojan Dropper that means the module extracts and runs another malicious module from an encrypted file included in the app’s resources. This “dropped” malware, in turn, is a Trojan Downloader that downloads more malicious modules depending on what its creators are up to at the moment,” explained the report. With this Trojan Dropper module, a particular app may show intrusive ads and sign users up for paid subscriptions.

Source link

Download Nulled WordPress Themes
Download WordPress Themes
Free Download WordPress Themes
Download Premium WordPress Themes Free
free online course

Tagged with:



Leave a Reply ✍


loading...