Skip to content

Malicious SpyPhone MalWARE Disguises Itself as a Legitimate App ~ Takes Control of Your Android ~ Opens your Mic ~ Opens your Camera’s Eye ~ Takes your Identity, or Worse ๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž

August 3, 2013

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž While Android continues to grow from strength in offering consumers an enjoyable all-round user experience, there are some very Frightening trade-offs when compared to the likes of Apple’s iPhone iOS. Malicious SpyPhone MalWARE disguises Itself as a Legitimate App ~ Takes Control of Your Android ~ Opens your Mic ~ Opens your Camera’s Eyes ~ Takes your Identity, or worse…. Do we have your Attention yet.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Malicious SpyPhone Software Can Disguise Itself as a Legitimate App. It then takes control of your Android Device without changing how you interact with your smartphone.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Black Hat Security. Malware remains a significant issue on Googleโ€™s mobile operating system, this being the week of the Black Hat Security conference, examining new threats and possible solutions pertaining to Android security have been coming to light.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž One Significant Threat, outlined by Director of Kindsight Security Labs’ Kevin McNamee, involves the installation of a Malicious App named "SpyPhone." Once the SpyPhone App is installed onto an Android SmartPhone or Tablet, the App’s Malicious-Code infiltrates the Android device, and can essentially keep tabs on all of your activity, hear you, watch you, record your voice and telephone calls, look at you, through the front and rear cameras, watching all your whereabouts, record all your key-strokes, copy your bank records, transfer money right from your own smartphone. This App is very smart, as it disguises itself as a safe App, rendering it invisible to “anti-malware” software.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Do we have Your Attention.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Android Malware is marginally common in the grand scheme of things. However, when compared with the relatively incident-free Apple’s iOS, this Android prone malware capability is, or should be frightening for Android users and Android smartphone makers.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž SpyPhone is a lot more prevalent in Android devices than, Android smartphone makers would want publicized. Recent sampling of 500,000 Android devices by Lacoon Mobile Security, discovered 625 Android devices were infected by SpyPhone Malicious Malware. Lacoon Mobile Security’s discovery-software is a Commercial product, used for all manner of purposes from International Spying to Parental monitoring, McNamee and his team have written a special code enabling itself to be Concealed within an App.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž So a perfectly legitimate Instagram or Cut The Rope APK could be manipulated, enabling a Hacker to Spy on a frightening number of aspects regarding your device, its contents, where it is, where you are, who’s talking in it, who’s talking even when not on a call, listening all the time to conversations while your device is in your pocket, what things look like using the Android’s Front and Rear cameras in HDTV quality videos, live streaming all this content to the “Bad Guys” in Russia, Iran, Yemen…

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž The App’s code when being installed to request all the typical permissions, leaving the SpyPhone App with free-reign of all your contacts, messages, emails, bank accounts, the microphones, the video cameras, the 10MP digital camera, you name it, the malicious code is in total control of all your personal, private, confidential, business information, plus your whereabouts, tracking your every movement, recording everything at will.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Itโ€™s rather unnerving to think how easily an intruder could get into your deviceโ€™s innards by simply repackaging a common App, and by (A) sticking to the Google Play Store, (B) making sure to check for unnecessary permission requests from basic apps may keep you safe, thereโ€™s no doubt that SpyPhone is one to be keeping a Wide Open Eye out for.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž The fact that SpyPhone malware operates completely silently, in the background, is perhaps the most frightening aspect of all. Therefore if you were to unwittingly install SpyPhone on your Android device, you would have no way of knowing anything was amiss until, say, your bank accounts were totally withdrawn to zero balances, or worse, your identity completely taken, your private actions were all Publicized, or worse Distributed to the Russian, Mid East, or Asian Organized Crime circles to take your money or to enforce extortion schemes.

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž An intruder would have better opportunity getting their unscrupulously SpyPhone malware-repackaged App, into circulation by distributing it outside of the Play Store. Google is monitoring their channels, and may pick up on a hidden or disguised SpyPhone App. With that said, itโ€™s not beyond the realm of possibility, that the SpyPhone Malware App will eventually “slip through the net.”

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Therefore always be on the look-out when an App appears to be making too many unreasonable permissions requests upon its installation. Follow this slogan: “When in Doubt Don’t”

๐Ÿ˜Ž๐Ÿ‘€๐Ÿ˜Ž Looking for an “excuse” to migrate to a safer platform, SpyPhone and Android Malware concerns may be a good reason to jump to Apple’s safer iPhone.


Pleased you are reading, as our readers ๐Ÿ“š thousands world-wide, give motivation ๐Ÿ“ข for new topics published every day. Spread the Word ๐Ÿ“ฌ to your friends, family, and associates; simply forward ๐Ÿ“ฎ the link below, post it on your Facebook and Twitter Pages for their review,, anyone may subscribe, its secure, confidential, as every time ๐Ÿ“… I publish a story ๐Ÿ“ the WordPress system {not I} sends ๐Ÿ“ฌ a reminder to you with a link to my new Article:

Perspective: These articles are created to inform a diverse audience, whether it be photography, digital cameras, lenses, Image editing, Apps, Smartphones, iPads, iPhones, Laptops and related products, Health & Wellness, or any news-worthy topic. The purpose is to inform, from sources that are believed to be reliable, and stimulate Dialogue.

To learn more about what else we do, take a moment and visit these links, browse around. We are pleased with over 22 million visits in recent years: For Health & Wellness; If digital Imaging is of interest, I teach a course named "Principles of Digital Imaging and Post Image Processing" as an Adjunct Prof at FAU:

When I do what I do… I usually do it here.

  1. Thanks for sharing your thoughts on spy for windows mobile.

  2. I just like the helpful information you supply for your articles.
    I will bookmark your weblog and take a look at again here regularly.
    I’m fairly certain I will be told many new stuff right here!
    Best of luck for the next!

    • The android Malware spyware issue is real. As my article points out into thousand and 12 the FBI and Homeland security released a joint report about android Malware spyware attacks because there are a good number of US Government employees that use those devices, albeit the number is shrinking as iPhone further penetrates the government market formerly using BlackBerrys

      iPhone Marketshare is an interesting statistic. Where it becomes inaccurate with iPhones is too many junk smart phones are included in the same category. It’s been reported by mobile phone providers that iPhone activations represent 54% of total activations in North America. My personal observation in South Florida probably represent 80% of the smartphone users.

  3. This iss very interesting, You’re aan excessively professional blogger.
    I’ve joined your feed and look ahead to searching for moe
    off your excellent post. Additionally, I have
    shared your website inn my social networks

    • Wonderful. Your remarks is what drives me to deliver more and better articles. Our readership is over 63,000 and growing by about 1000/week. Ask your Social Network followers to pass our BLOG along to their followers, and so on. I’m looking for over 1,000,000 readership. Nothing sold on the BLOG, just passing knowledge along…

    • Thank you for your kind remarks.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: