fbpx
September 22, 2020
Google removes more Android apps from the Google Play Store infected with Joker malware

Remove the Following Apps Right Now or Get Ripped Off Big Time

After finding a number of apps contaminated with Joker malware on the Google Play Store, the company has delisted even more bad actors…

Earlier this month, security researchers found at least six Android apps infected with Joker malware. Now, even more have been discovered and Google has pulled them off the Google Play Store. While this means that future downloads are no longer possible, it doesn’t protect consumers who have already installed the malicious programs. So, it’s imperative to check if any are present to delete them immediately. 

Google Removes more Android Apps from the Google Play Store Infected with Joker Malware

The Joker malware operates clandestinely, without the victim’s knowledge. In fact, victims don’t become aware of the scheme until they’re hit with an outrageous phone bill that’s laden with additional charges. Basically, the malware dials up premium numbers, signs victims up for in-app purchases, and performs other costly operations. These add up to a significant sum, causing monthly bills to balloon.

Altogether, there are about seventeen apps containing the Joker malware that have been removed from the Google Play Store. Here’s a list of the mobile programs to remove right away:

  • com.imagecompress.android
  • com.relax.relaxation.androidsms
  • com.file.recovefiles
  • com.training.memorygame
  • Push Message- Texting & SMS
  • Fingertip GameBox
  • com.contact.withme.texts
  • com.cheery.message.sendsms (two different instances)
  • com.LPlocker.lockapps
  • Safety AppLock
  • Emoji Wallpaper
  • com.hmvoice.friendsms
  • com.peason.lovinglovemessage
  • com.remindme.alram
  • Convenient Scanner 2
  • Separate Doc Scanner

Owen E. Richason IV

Covers social media, apps, search and like news. History buff, movie and theme park lover. Blessed dad and husband. Owen is also a musician and is the founder of Groove Modes.          

View all posts by Owen E. Richason IV →