Malware-infected Android app records users' audio without consent.

TL;DR Summary
The iRecorder Screen Recorder app, which had over 50,000 downloads from Google Play, was found to have been updated with malicious code that allowed it to surreptitiously record nearby audio every 15 minutes and send it to an attacker-controlled server. The app used code from AhMyth, an open source RAT, and was heavily modified to become AhRat. The purpose of the app remains unclear, but it is possible that it is part of an active espionage campaign. Google has not commented on the discovery of the malicious app.
- Legit app in Google Play turns malicious and sends mic recordings every 15 minutes Ars Technica
- A Google Play app started recording users without their knowledge The Verge
- The app iRecorder - Screen Recorder is infected with malware Komando
- This legit Android app turned into audio-snooping malware – and Google missed it The Register
- Data Stealing Malware Discovered in Popular Android Screen Recorder App The Hacker News
Reading Insights
Total Reads
0
Unique Readers
1
Time Saved
4 min
vs 4 min read
Condensed
89%
788 → 88 words
Want the full story? Read the original article
Read on Ars Technica