Skip to main content

If you have one of these apps on your Android phone, delete it immediately

The app drawer on the Google Pixel 8 Pro.
Joe Maring / Digital Trends

The NSO Group raised security alarms this week, and once again, it’s the devastatingly powerful Pegasus malware that was deployed in Jordan to spy on journalists and activists. While that’s a high-profile case that entailed Apple filing a lawsuit against NSO Group, there’s a whole world of seemingly innocuous Android apps that are harvesting sensitive data from an average person’s phone.

The security experts at ESET have spotted at least 12 Android apps, most of which are disguised as chat apps, that actually plant a Trojan on the phone and then steal details such as call logs and messages, remotely gain control of the camera, and even extract chat details from end-to-end encrypted platforms such as WhatsApp.

Recommended Videos

The apps in question are YohooTalk, TikTalk, Privee Talk, MeetMe, Nidus, GlowChat, Let’s Chat, Quick Chat, Rafaqat, Chit Chat, Hello Chat, and Wave Chat. Needless to say, if you have any of these apps installed on your devices, delete them immediately.

Please enable Javascript to view this content

Notably, six of these apps were available on the Google Play Store, raising the risk stakes as users flock here, putting their faith in the security protocols put in place by Google. A remote access trojan (RAT) named Vajra Spy is at the center of these app’s espionage activities.

A chat app doing serious damage

A phone spying on a person.
Dall.E-3 / Digital Trends

“It steals contacts, files, call logs, and SMS messages, but some of its implementations can even extract WhatsApp and Signal messages, record phone calls, and take pictures with the camera,” says the ESET finding report.

Notably, this won’t be the first time that Vajra Spy has raised alarm. In 2022, Broadcom also listed it as a Remote Access Trojan (RAT) variant that leverages Google Cloud Storage to gather data pilfered from Android users. This malware has been linked to the threat group APT-Q-43, which is known to target members of the Pakistani military establishment specifically.

VajraSpy’s apparent objective is to harvest information from the infected device and capture the user’s data, such as text messages, WhatsApp and Signal conversations, and call histories, among other things. These apps, most of which disguised themselves as chat apps, employed romance-aligned social engineering attacks to lure the targets.

This is a recurring theme, especially given the target of the apps. In  2023, Scroll reported on how spies from across the border are using honey traps to lure Indian scientists and military personnel to extract sensitive information using a mix of romance and blackmailing efforts. Even the FBI has issued an alert about digital romance scams, while a White House staffer lost over half a million dollars in one such trap.

Security warning illustration on a phone.
Dall.E-3 / Digital Trends

In the most recent case of VajraSpy deployment, the apps were able to extract contact details, messages, a list of installed apps, call logs, and local files in different formats such as .pdf, .doc, .jpeg, .mp3, and more. Those with advanced functionalities mandated using a phone number, but in doing so, they could also intercept messages on secure platforms such as WhatsApp and Signal.

Aside from logging the text exchange in real-time, these apps could intercept notifications, record phone calls, log keystrokes, take pictures with the camera without the victim knowing about it, and take over the mic to record audio. Once again, the latter is not surprising.

We recently reported on how bad actors are abusing push notifications on phones and selling the data to government agencies, while security experts told Digital Trends that the only fool-proof way to stop this is to disable notification access for apps.

Nadeem Sarwar
Nadeem is a tech journalist who started reading about cool smartphone tech out of curiosity and soon started writing…
Niagara Launcher, one of the best Android launchers, finally has backups
Niagara Launcher on a Samsung device.

Niagara Launcher, one of the most popular apps in the Google Play Store, has received a significant update. It now includes a backup feature, which many users have requested. The news about Niagra’s “Winter Update” was announced on X.

The new backup feature allows launcher users to save their settings for future restoration. This is especially helpful for those switching phones, resetting their devices, or experimenting with different setups. It integrates with Android’s built-in backup system, automatically saving your settings to Google Drive. This backup includes user favorites, app swipe actions, blacklisted apps, and more.

Read more
Wish you had Apple AirDrop on an Android phone? It might actually happen
iPhone showing iOS 17 prompt to receive AirDrop photo transfer.

AirDrop and AirPlay are popular features that significantly benefit users, but are currently unavailable to non-Apple users. This may change in the future in the European Union (EU), where proposals are being developed that could require Apple to make these features accessible on Android devices.

According to TechRadar, the proposed changes under the Digital Markets Act (DMA) would require Apple to make its exclusive features available to other developers and smartphone manufacturers.

Read more
Nothing’s Android 15 update is now rolling out with these new features
Lock Screen of Nothing OS 3.

After weeks of beta testing, Nothing is the latest name to join the stable Android 15 rollout bandwagon. In a community update today, the company announced the wide release of Nothing OS 3.0 based on Android 15 for its relatively slim smartphone portfolio.

The first devices to get the update are the Nothing Phone 2 and Nothing Phone 2a, both of which are slated to get the over-the-air (OTA) update in a phased format throughout December. Next in line are the Nothing Phone 1, Nothing Phone 2a Plus, and CMF Phone 1, which are scheduled to receive the OS upgrade early next year.

Read more