{"id":235220,"date":"2025-03-25T15:26:56","date_gmt":"2025-03-25T15:26:56","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=235220"},"modified":"2025-03-25T15:26:56","modified_gmt":"2025-03-25T15:26:56","slug":"bitdefender-infractorii-cibernetici-au-reusit-sa-introduca-cel-putin-331-de-aplicatii-periculoase-in-magazinul-oficial-google-play-descarcate-de-peste-60-de-milioane-de-ori","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=235220","title":{"rendered":"Bitdefender: Infractorii cibernetici au reu\u015fit s\u0103 introduc\u0103 cel pu\u0163in 331 de aplica\u0163ii periculoase \u00een magazinul oficial Google Play, desc\u0103rcate de peste 60 de milioane de ori"},"content":{"rendered":"<p>\nInfractorii cibernetici au reu\u015fit s\u0103 introduc\u0103 cel pu\u0163in 331 de aplica\u0163ii periculoase \u00een magazinul oficial Google Play, desc\u0103rcate de peste 60 de milioane de ori, au transmis printr-un comunicat reprezentan\u0163ii Bitdefender, produc\u0103tor global de solu\u0163ii de securitate informatic\u0103.<\/p>\n<p>\n\u201eAceste aplica\u0163ii aparent banale, cum ar fi scanere pentru coduri QR, aplica\u0163ii de monitorizare a cheltuielilor, aplica\u0163ii pentru s\u0103n\u0103tate sau pentru fundaluri de ecran, afi\u015feaz\u0103 agresiv reclame \u00een mod nedorit \u015fi chiar \u00eencearc\u0103 s\u0103 conving\u0103 utilizatorii s\u0103 \u00ee\u015fi divulge datele personale, inclusiv creden\u0163iale de acces \u015fi informa\u0163ii bancare, prin atacuri de tip phishing\u201d, au spus reprezentan\u0163ii Bitdefender.<\/p>\n<p>\nEi au ad\u0103ugat c\u0103 infractorii au folosit metode sofisticate pentru a p\u0103c\u0103li m\u0103surile de securitate ale Google, printre care \u015fi ascunderea pictogramelor aplica\u0163iilor imediat dup\u0103 instalare \u2013 comportament restric\u0163ionat \u00een versiunile mai recente de Android. Astfel, victimele nu le pot identifica sau elimina u\u015for din telefon. \u00cen unele cazuri, numele aplica\u0163iilor se schimba \u00een \u201eGoogle Voice\u201d pentru a le face s\u0103 par\u0103 complet normale.<\/p>\n<p>\n&nbsp;\u201eAplica\u0163iile periculoase identificate de cercet\u0103torii Bitdefender aveau, \u00een majoritatea cazurilor, anumite func\u0163ionalit\u0103\u0163i legitime pentru a induce \u00een eroare utilizatorii, dar puteau \u015fi s\u0103 ruleze reclame chiar \u015fi f\u0103r\u0103 permisiunile obi\u015fnuite sau interac\u0163iunea direct\u0103 a utilizatorului. \u00cen plus, puteau lansa automat pagini false, care solicit\u0103 date sensibile, precum parole pentru Facebook sau YouTube \u015fi chiar informa\u0163ii despre carduri bancare. \u201d<\/p>\n<p>\nUn alt risc identificat este capacitatea acestor aplica\u0163ii de a porni f\u0103r\u0103 interac\u0163iunea utilizatorului, de\u015fi acest lucru nu ar trebui s\u0103 fie posibil tehnic \u00een Android 13.&nbsp;<\/p>\n<p>\nAnaliza speciali\u015ftilor Bitdefender mai arat\u0103 c\u0103 primele aplica\u0163ii ale acestui val au devenit active pe Google Play \u00een toamna lui 2024. \u201eUnele dintre aceste aplica\u0163ii au fost ini\u0163ial legitime, \u00eens\u0103 au devenit periculoase dup\u0103 actualiz\u0103ri ulterioare. Campania pornit\u0103 anul trecut este \u00eenc\u0103 activ\u0103, iar cele mai recente aplica\u0163ii infectate au fost \u00eenc\u0103rcate \u00een Google Play \u00een prima s\u0103pt\u0103m\u00e2n\u0103 din martie 2025.\u201d<\/p>\n<p>\nCercet\u0103torii Bitdefender avertizeaz\u0103 c\u0103, de\u015fi Google elimin\u0103 periodic astfel de aplica\u0163ii periculoase, infractorii cibernetici g\u0103sesc \u00eentotdeauna noi metode de a exploata sistemele de protec\u0163ie existente \u015fi folosesc adesea instrumente speciale achizi\u0163ionate pe pia\u0163a neagr\u0103, cum ar fi instrumente de \u00eempachetare cu ajutorul c\u0103rora ascund adev\u0103rata natur\u0103 a codului periculos \u015fi \u00eel fac s\u0103 par\u0103 autentic. \u201eTocmai de aceea, speciali\u015ftii recomand\u0103 utilizatorilor s\u0103 nu se bazeze exclusiv pe protec\u0163ia implicit\u0103 oferit\u0103 de Android sau de Google Play, ci s\u0103 foloseasc\u0103 solu\u0163ii dedicate de securitate.\u201d<\/p>\n<p>\nPentru a se proteja, speciali\u015ftii Bitdefender recomand\u0103 utilizatorilor s\u0103 fie precau\u0163i \u015fi s\u0103 verifice \u00eentotdeauna sursa aplica\u0163iilor \u00eenainte de desc\u0103rcare, s\u0103 citeasc\u0103 atent recenziile \u015fi s\u0103 acorde o aten\u0163ie special\u0103 permisiunilor solicitate.<\/p>\n<p>\n\u201eDe asemenea, ei atrag aten\u0163ia c\u0103 este mult mai dificil s\u0103 detectezi \u015fi s\u0103 elimini amenin\u0163\u0103rile pe telefon dec\u00e2t pe desktop, deoarece aplica\u0163iile periculoase pot s\u0103 nu afi\u015feze pictogramele \u015fi activitatea derulat\u0103. Tehnologia Bitdefender Mobile Security, denumit\u0103 \u201eApp Anomaly Detection\u201d, monitorizeaz\u0103 comportamentul aplica\u0163iilor imediat dup\u0103 instalare \u015fi detecteaz\u0103 astfel rapid orice schimbare suspect\u0103 care transform\u0103 aplica\u0163iile legitime \u00een unele periculoase.\u201d<\/p>\n<p>\n&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Infractorii cibernetici au reu\u015fit s\u0103 introduc\u0103 cel pu\u0163in 331 de aplica\u0163ii periculoase \u00een magazinul oficial Google Play, desc\u0103rcate de peste 60 de milioane de ori, au transmis printr-un comunicat reprezentan\u0163ii Bitdefender, produc\u0103tor global de solu\u0163ii de securitate informatic\u0103. \u201eAceste aplica\u0163ii aparent banale, cum ar fi scanere pentru coduri QR, aplica\u0163ii de monitorizare a cheltuielilor, aplica\u0163ii [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[510],"tags":[263,8039,22530,219],"class_list":["post-235220","post","type-post","status-publish","format-standard","hentry","category-actualitate","tag-aplicatii","tag-bitdefender","tag-identificare","tag-securitate"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/235220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=235220"}],"version-history":[{"count":0,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/235220\/revisions"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=235220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=235220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=235220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}