PSA – Criminals Using Beta-Testing Apps to Exploit Mobile Devices

The FBI has issued a public warning about a growing cybersecurity threat where cybercriminals are exploiting mobile beta-testing applications (apps) to carry out fraudulent activities. Beta-testing apps, which are in-development apps provided by mobile app stores like Google Play and the Apple App Store, typically escape the scrutiny of mobile operating system review processes, making them attractive targets for malicious actors.

The FBI has uncovered instances where unidentified cybercriminals engage victims through dating and social networking apps, directing them to download seemingly legitimate mobile beta-testing apps, often posing as cryptocurrency exchanges. Once the victim inputs their genuine account details into the app, believing they are investing in cryptocurrency, the money is instead diverted to the cybercriminals.

What are Beta-Testing Apps?

Mobile beta apps, often referred to as beta-testing applications or simply beta apps, are software applications that are in a testing phase before their official release to the general public. Beta apps serve as a way for developers to test their software in real-world conditions and receive valuable feedback from users. This feedback helps developers improve the app’s functionality, user interface, and overall performance. These apps are not yet finalized and are made available to a select group of users or testers to gather feedback, identify and fix bugs, and ensure the app functions properly across a variety of devices and scenarios.

Beta testing allows developers to ensure that the app works on various devices, operating systems, and network conditions. This helps in optimizing the app’s performance for a wide range of users. It’s important to note that beta apps are not fully polished or finished products. Beta testers typically volunteer for this role and are often enthusiastic about helping improve the app. Additionally, beta apps are usually available for free during the testing phase, but this may change once the app officially launches.

Contact Dark Blue Technologies

Get in touch with us and learn how we can assist your business with IT solutions.

Please enable JavaScript in your browser to complete this form.

How Are Criminals Using these Beta-Testing Apps?

According to its report on the matter, the FBI says that many of these malicious beta apps use names, app icons and descriptions similar to legitimate apps in order to appear more trustworthy. This can lead potential victims into installing an app they might otherwise avoid. The FBI has uncovered instances where unidentified cybercriminals engage victims through dating and social networking apps, directing them to download seemingly legitimate mobile beta-testing apps, often posing as cryptocurrency exchanges. Once the victim inputs their genuine account details into the app, believing they are investing in cryptocurrency, the money is instead diverted to the cybercriminals.

Here’s an expanded explanation of how they operate:

  1. Phishing Emails: Phishing is a deceptive technique where cybercriminals send fraudulent emails that appear to come from reputable sources, such as well-known companies or organizations. These emails often contain convincing messages that aim to trick recipients into taking specific actions, such as clicking on malicious links, downloading harmful attachments, or, in this case, installing a rogue beta app. The hackers craft emails that convincingly suggest the recipient should install the beta version of an app. Since phishing emails can sometimes be easy to spot, cybercriminals are continually refining their tactics to make them more convincing and evade email filters.
  2. Romance Scams: In a romance scam, cybercriminals create fake online personas, often posing as potential romantic interests on dating apps and social media platforms. They engage with unsuspecting individuals, building trust and emotional connections over time. Once a level of trust has been established, the cybercriminals then introduce the idea of installing one of these fraudulent beta apps. They might claim that it’s a secure way to communicate or share private photos, playing on the victim’s emotions and desire for intimacy. Victims, who may have developed feelings for the scammer, are more likely to comply with the request, believing it to be a genuine and safe act.
  3. Use of Social Engineering: Social engineering is a tactic that manipulates human psychology to convince individuals to take certain actions. In this case, the cybercriminals use social engineering techniques to manipulate victims into installing the rogue beta app. They may employ flattery, emotional manipulation, or even threats to coerce victims into compliance.
Attackers are using beta-testing apps to compromise individuals.

If a victim falls prey to one of these fraudulent beta-testing apps masquerading as legitimate cryptocurrency investment tools, the app can deceptively extract funds from the victim through counterfeit investment schemes.

Identifying Malicious Apps

Here are some indicators to watch out for when identifying a malicious app:

  1. Increased Battery Drain: If your mobile device’s battery is depleting unusually quickly.
  2. Sluggish Device Performance: If your device slows down significantly when performing basic tasks.
  3. Unauthorized App Installations: When apps mysteriously appear on your device without your consent or knowledge.
  4. Persistent Pop-Up Ads: Frequent and bothersome pop-up advertisements appearing on your screen.
  5. Suspicious Download Metrics: Apps with an unusually high number of downloads but few or no user reviews.
  6. Excessive Permissions: Apps requesting access to permissions unrelated to their advertised functionality.
  7. Grammatical Errors and Lack of Detail: Poor spelling, vague descriptions, or a lack of information about the app’s functions in its description.
  8. Deceptive Pop-Ups: Pop-up notifications that resemble ads, system warnings, or urgent reminders.

Do you have confidence in your cybersecurity tech stack?

Are you certain your tech stack is protecting your employees and endpoints? Dark Blue Technologies combines security solutions from leading cybersecurity partners to provide organizations with best-in-class coverage for all attack surfaces. We provide businesses with cutting-edge XDR, cybersecurity awareness training, hardware and cloud optimizations, and more. Get in touch with us to find out if we can help improve your business security.

Proactive Protection

To protect yourself from falling victim to such scams, consider the following recommendations:

  1. Research App Developers and Reviews: Always check the credibility of app developers and read user reviews before downloading any apps.
  2. Avoid Sending Payments to Online Contacts: Refrain from sending money to individuals you’ve only interacted with online, even if you believe you have a relationship with them.
  3. Exercise Caution with Personal and Financial Information: Do not share personal or financial information through email or messages, and avoid responding to solicitation emails or messages, including clicking on links.
  4. Verify App Legitimacy: Be skeptical of suspicious-looking investment apps and only use them if their legitimacy can be confirmed.
  5. Beware of Urgency and Threats: Be cautious of messages conveying urgency or threats, such as threats of account closure.
  6. Scrutinize Email Attachments: Even if you know the sender, be wary of unsolicited email attachments, as cybercriminals can spoof the sender’s address. Avoid opening suspicious attachments, even if your antivirus software indicates they are clean.
  7. Avoid Clicking Suspicious Links: Don’t click on links in emails or text messages; instead, hover over the link to check its URL for inconsistencies.
  8. Examine Attachments and Hyperlinks: Carefully inspect attachments and website links in emails, even from familiar contacts. Save and scan attachments before opening them.
  9. Keep Software Updated: Regularly update your software to patch vulnerabilities.
  10. Manage App Permissions: Limit app permissions and uninstall apps you no longer use to minimize potential risks.

Ready to talk about IT Solutions?

Fill out our online form with information about your next project or technical needs and we will be in touch within one business day.