Uninstall these dangerous Android apps now - they could be stealing your data

All of these apps share the same privacy policy and were created by the same group of developers

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

The latest investigation fromCyberNewshas uncovered a secret network of 27 app developers who have created 103 apps with over 69m installs which share many of the same characteristics and often times even the same code.

The developers behind these apps are copying each others' apps, moving apps between developers, outright stealing apps from other more popular developers outside their network and possibly even committing fraud right underGoogle’s nose.

The apps from this secret network all have two-part Western names, ask for a large number of dangerous permissions, all share the same Privacy Policy (where only the developer’s name is changed), are visually similar and all link to the same incomplete website on theirGoogle Play Storepages.

The business model for this secret network appears to involve rapidly copying other apps, changing small visual aspects to make each app appear more unique and launching them under various developers' names.CyberNewsestimates that the revenue for these apps could be nearly $1m per month.

Dangerous Android apps

Dangerous Android apps

These apps could potentially be putting users' data at risk as their identicalprivacy policyallows them to collect any information that identifies the user that “may be transmitted or received when you use an application” including users' physical location, email addresses, unique device identifier (IMEI), billing or shipping information and information stored on their devices.

Additionally, all of these apps request access from a number of device permissions such as modifying or deleting USB storage, turning a device’s microphone on and off, accessing a user’s camera and pictures, modifying system settings and more. All of these app permissions have next to nothing to do with each app’s core function which immediately raises suspicions.

Senior researcher atCyberNews, Bernard Meyer provided further insight on just how dangerous these apps can be, saying:

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

“In the best case scenario, these apps may provide users with a very poor user experience, especially when the apps are flooded with ads at every turn. In the worst case scenario, these apps can later become vehicles for malicious purposes, including stolen data or other malware.”

You can check out CyberNews’full reporton the matter to see if you have any of these suspicious apps installed on your device and if so, you should delete them immediately or risk having your data stolen by the group of developers behind them.

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.

Washington state court systems taken offline following cyberattack

Is it still worth using Proton VPN Free?

One more AMD eGPU docking station goes on sale — but it doesn’t have USB 4.0, can’t accommodate an M.2 SSD and requires an OCuLink connector to feed the RX 7600M XT chip