App stores are increasingly becoming a major security worry

A close-up photo of an iPhone, with the App Store icon prominent in the center of the image.
(Image credit: Brett Jordan / Pexels)

  • Gen research claims malicious apps on major app stores are on the rise
  • New banking trojans, predatory loan apps, and similar, have been spotted
  • Official app stores are still a safer bet than third-party ones

App stores are becoming an increasingly major security concern, as more and more malicious apps are discovered in stores owned by major brands, experts have warned.

A new report from cybersecurity researchers Gen claims it observed new mobile bankers (phone applications designed to steal banking information) launched in the fourth quarter of 2024, often disguising themselves as Visa apps, dating apps, or Chrome browsers. Gen added that the well-known BankBot banker compromised 236% more devices compared to the previous quarter.

Besides banker apps, malicious loan apps surged as well, the researchers said. These promise quick money, but demand excessive permissions (SMS, photos, sensitive data) which they later use in extortion, threatening to publish victim data unless they pay up.

Generally safe

Gen also noted cybercriminals are adopting novel distribution tactics in app stores. Recently, they discovered a new malware strain disguised as a Body Mass Index (BMI) calculator. The app was spread through the Amazon App Store.

Major app stores like the Apple App Store, Google Play Store, and Samsung Galaxy Store are generally safe because these companies invest heavily in security measures to protect users. They use automated malware detection, manual app reviews, and strict developer policies to prevent harmful apps from reaching their customers.

Features like Google Play Protect scan apps in real-time, while Apple’s notarization process ensures apps are vetted before approval. Regular security updates, user reporting systems, and app removal policies further enhance safety.

Obviously, no platform is completely risk-free. We’ve seen malicious apps make their way into these stores in the past, and we’ll probably see them in the future, as well. However, these app stores provide a significantly safer environment than third-party or unofficial sources.

You might also like

TOPICS

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.

Read more
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Why is there so much spyware hidden in the Play Store?
Android phone malware
Screen reading malware found in iOS app stores for first time - and it might steal your cryptocurrency
mobile phone
Popular Android financial help app is actually dangerous malware
Malware worm
Coordinated global mobile malware campaign targets banking apps and cryptocurrency platforms
An Android phone being held in the hand
These malicious Android apps were installed over 60 million times - here's how to stay safe
 In this photo illustration a Google Play logo seen displayed on a smartphone.
Over 2 million risky Android apps were blocked from the Play Store last year
Latest in Security
ransomware avast
Ransomware attacks are costing Government offices a month of downtime on average
Lock on Laptop Screen
Data breach at Pennsylvania education union potentially exposes 500,000 victims
Data leak
Top collectibles site leaks personal data of nearly a million users
Spyware
Stalkerware data breach potentially hits over 2 million users, including thousands of Apple devices
An American flag flying outside the US Capitol building against a blue sky
Five Eyes "cannot replace US intel in Ukraine", claims former US Cyber Command Chief
Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.
Criminals are using a virtual hard disk image file to host and distribute dangerous malware
Latest in News
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
A fresh Samsung Galaxy S25 Edge benchmark leak has eased my worries about its performance
Google Pixel 9 in green Wintergreen color showing AI features on screen
Older Pixels just got a big performance boost, while the Pixel 9a is lacking a key feature
Wonka poster
Netflix cooks up sweet new reality TV series based on Charlie and the Chocolate Factory, and it's a dream come true for me
Citroen 2CV
The retro EV resurgence is in full swing, as Citroen confirms the iconic 2CV will return with batteries
Hugging Snap
This AI app claims it can see what I'm looking at – which it mostly can
Apple iPhone 16 Pro Max REVIEW
The latest batch of leaked iPhone 17 dummy units appear to show where glass meets metal on the new designs