• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Fraudulent Photo Application Operation Detected on Google Keep

You are here: Home / General Cyber Security News / Fraudulent Photo Application Operation Detected on Google Keep
July 23, 2020

Researchers have uncovered a destructive cyber-procedure involving fraudulent image-enhancing apps, none of which were being uncovered to purpose as marketed.

New research published today by White Ops’ Satori risk intelligence group unveiled 29 fraudulent apps to be part of a nefarious cyber-plan that they have named Chartreuse Blur. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The apps, which have now been downloaded 3.5 million instances from the Google Play Store, lead to out-of-context (OOC) adverts to run rampant on a compromised device and randomly open web browsers although the product is in use. 

Researchers noted that any time a compromised unit is unlocked, plugged into a charger, or even switches mobile networks, an OOC ad pops up on the household screen, whether or not the fraudulent app is open up or not. 

Whoever is guiding the operation experimented with tough to hide the genuine character of the apps concerned. The crew found the apps’ malicious code has been buried in a a few-stage payload evolution so that none of the code seems problematic until eventually stage three. 

Attempts were also made to reduce consumers from deleting any of the applications they have mounted. Almost instantly upon set up, the app icon disappears from the device’s house display screen, building it unbelievably complicated for users to discover and remove. 

The name Chartreuse Blur was specified to the operation since the the vast majority of the apps involved are masquerading as picture editors and involve the globe “blur” in their deal identify. 

“If the application you have just downloaded is participating in cover and search for with you, the icon disappearing from your home display screen, it may well be bogus,” warned researchers.

“If the only way you can open up the app is by likely into your Configurations menu and getting it in a long listing of apps, it may well be bogus. If after you down load this app, you open up your phone and you start off having bombarded by ads just appearing out of nowhere, it may possibly be bogus.”

One particular of the applications exposed by researchers, the Sq. Image Blur application, has since been taken off from the Google Play Retail outlet.

“The developer identify for Square Photograph Blur — ‘Thomas Mary’ — is virtually certainly bogus,” noted researchers. 

“All of the apps in this investigation attribute builders whose ‘names’ are frequent English language names smashed together, seemingly at random.”

Previous Post: «Sharp Spike In Ransomware In U.s. As Pandemic Evokes Attackers Sharp Spike in Ransomware in U.S. as Pandemic Evokes Attackers
Next Post: US Banks Can Now Provide Crypto Custody Companies Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.