Tue, 21-Oct-2025

Google Ads | Google Ads | Google Ads | Google Ads | Google Ads | Google Ads | Google Ads | Google Ads

Watch out for These Suspicious Android Apps Stealing Data!

Watch out for These Suspicious Android Apps Stealing Data!

Watch out for These Suspicious Android Apps Stealing Data!

  • The Cabinet Division issued a cyber security advisory warning.
  • These apps aim to steal personal and financial data, including media files.
  • Users and officials are urged to download apps only from the Google Play Store.

Islamabad, July 2024— The Cabinet Division of Pakistan has issued a critical cyber security advisory warning against Advanced Persistent Threats (APTs) targeting Pakistani officials through suspicious Android apps available on the Google Play Store.

According to the advisory, these malicious apps are engineered to clandestinely harvest personal and financial data, including media files, contact lists, calendar entries, and call logs, without user consent. Shockingly, some apps even offer to sell personal identifiable information (PII) of Pakistani citizens for a fee.

The advisory identifies several suspicious apps that pose significant risks to user data. These include the ISSB App for Armed Forces, Initial Test Preparation, Intelligence Mcqs Test, Pak eServices 2024, Electricity Bill Checker, Sui Gas Bill Viewer, Online Shopping Pakistan, All Sim Packages, and Bike Services. All these apps have been attributed to ITAppCoding (itappcoding28@gmail.com).

Officials stress the importance of exercising caution when using such apps to safeguard personal and sensitive information from exploitation.

Ensuring Security

The advisory underscores the necessity for proactive measures to safeguard personal and professional data against exploitation by malicious apps. By staying vigilant and adhering to these guidelines, individuals can significantly reduce the risk of falling victim to cyber threats.

[embedpost slug=”/whatsapp-to-get-new-meta-ai-features-for-android-users/”]

As cyber threats evolve, maintaining awareness and implementing robust security practices remain paramount to protecting sensitive information in the digital age.