Connect with us

Hi, what are you looking for?

APPS

Cybercriminals exploit Plants vs. Zombies 2 hype

A new wave of zombies is coming, and cybercriminals are in tow. The buzz surrounding the much anticipated Plants vs. Zombies sequel is drawing cybercriminals to take advantage of the hype.

Fake Plants vs. Zombie 2 link found on YouTube

Fake Plants vs. Zombie 2 link found on YouTube

Fake Plants vs. Zombie 2 link found on YouTube

A new wave of zombies is coming, and cybercriminals are in tow. The buzz surrounding the much anticipated Plants vs. Zombies sequel is drawing cybercriminals to take advantage of the hype.

The first wave of threat was detected around July 16, just a week after Plants vs. Zombies 2 was launched in Australia and New Zealand. Trend Micro found a link from a YouTube video page that redirected users to an online survey scam hosted on Blogger. No malware was detected.

By July 22, seven other Plants vs. Zombies 2-related threats spotted in Google Play were disguised either as downloaders or applications capable of pushing malicious ads to unsuspecting users.

TrendLabs fraud analyst Ruby Santos says the existence of these threats is nothing new. Cybercriminals always find a way to capitalize on any popular trends to lure unsuspecting users. In the past, they’ve targeted popular games like Candy Crush, Bad Piggies, and Temple Run.

Santos urges users to consider these tips so they can avoid getting scammed:
1. The usage of popular, up-and-coming sequels to high-profile game apps already available in the iOS App Store but not yet in Google Play
2. The fake apps asking for 5-star ratings and reviews before they could be ‘played’
3. The fake apps are free of charge, in contrast to the legitimate apps which cost money

Advertisement. Scroll to continue reading.

Santos added that even if Google is creating safety measures on their store, users should not be complacent in downloading apps. The standard rules of safe app downloading still apply: they should only download from verified first-party sources, and avoid sideloading or downloading from suspicious ‘developers’ or unauthorized parties.

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

Local IT and cybersecurity professionals came together for a full day of networking, talks, panel discussions, and hands-on activities that highlighted how fusing technologies...

HEADLINES

Enhanced with new management and operational tools designed specifically for Managed Service Providers (MSPs), the platform simplifies risk management for enterprises while also allowing MSPs...

HEADLINES

For this year’s conference, Trend Micro will highlight the pressing need to fuse together and integrate different technologies to produce holistic and multi-faceted solutions...

HEADLINES

Trend Micro research shows that cybercriminals are catching on to the explosion of enterprise AI use, resulting in a dramatic increase in AI-based tools available...

White Papers

The report warns that attackers are using more advanced methods to target fewer victims with the potential for higher financial gains.

HEADLINES

Robert McArdle, a leader in Trend Micro’s cybercrime research team and collaborator with the Federal Bureau of Investigation (FBI) and National Crime Agency (NCA),...

Biz Solutions

Trend Micro offers a suite of security solutions made for specific threats. 

HEADLINES

The widespread availability and improved quality of GenAI, coupled with the use of Generative Adversarial Networks (GANs), are expected to disrupt the phishing market...

Advertisement