top of page

CamScanner application is a malicious app

Security specialists from Kaspersky detected a Trojan-Dropper in the free form of the prominent PDF maker application.


www.darkworldhacker.com cam_scan_darkworldhacker_ethicalhacking


There's a decent shot that you think about the CamScanner application, which is accessible on both Android and iOS. The 'Telephone PDF Creator' or 'Scanner to Scan PDFs' application had more than 100 million downloads, before being booted from the Google Play Store. Analysts at Kaspersky Labs found a malware in the ongoing renditions of the well known OCR (optical character acknowledgment) application. It was obviously harboring a publicizing library containing a noxious module that the Kaspersky specialists distinguished as 'Trojan-Dropper.AndroidOS.Necro.n.' according to the report, this specific malware module was recently seen in a couple applications that came preinstalled on some Chinese cell phones.

The malware module was spotted distinctly on the Android form of the application and it appears as though its iOS variant is as yet accessible on the App Store, presumably in light of Apple's exacting application verifying approaches. As the Kaspersky blog notes, CamScanner was a truly decent application that offered prominent usefulness. While it showed advertisements for producing income, there were possibilities for in-application buys and purchasing a License independently for disposing of promotions. In any case, the Trojan Dropper module found inside the application is said to concentrate and run another vindictive module from a scrambled record incorporated into the application's assets.

This "dropped" malware, thusly, is a Trojan Downloader that downloads increasingly noxious modules relying upon what its makers are up to right now. For instance, an application with this malevolent code may give meddlesome promotions and indication clients up for paid memberships," the Kaspersky blog states. We checked to find that the CamScanner application has been expelled from the Google Play Store. In any case, Kaspersky reports that the application's engineers expelled the noxious code with the most recent update. Nonetheless, since the applications' adaptation changes for various gadgets, it is suggested that one uninstalls it as their gadget may have a more established form of that application that contains the Trojan Dropper malware module.

This isn't the first run through an application has slipped past through the Google Play Store's application reviewing process. While it can likewise be hard to stay aware of thousands of applications and their updates that are being discharged on the stage, Google needs to venture up its game on the off chance that it needs to guarantee clients that the Play Store is the most secure spot to download Android applications from


12 views0 comments
bottom of page