Categories: NewsTech

Over half a million Huawei devices have been infected with the “Joker” malware

We’ve spoken about the Joker malware before, of course. Awhile back, news emerged that a number of apps on the Google Play Store contained malware that stole social media credentials, while newer variants of the Joker virus were also hidden in various apps on the official Android app store. However, it now looks like the malware is migrating across to a brand new platform, one that was only recently created: the Huawei AppGallery.

According to a new report from Bleeping Computer, over 500,000 Huawei users have been discovered to have downloaded Joker-infected apps from the AppGallery. This malware automatically uses your device to subscribe to premium mobile services—without you knowing—with infected apps containing code to connect to a command-and-control server for instructions.

What’s worrying is that the infected apps can be difficult to detect, given the fact that many of these apps actually work as advertised (with added, unwanted functionality, of course). The apps usually also require access permissions to notifications—which allow the apps to access verification codes that are usually sent via SMS. All in all, the Joker malware can subscribe unknowing users to multiple paid services at any time—with a maximum of five at the same time.

If you want to avoid these apps (and you would, I’m guessing), Doctor Web reports that most of these come from Shanxi Kuailaipai Network Technology, with the following apps downloaded the most:

  • Super Keyboard
  • Happy Colour
  • Fun Color
  • New 2021 Keyboard
  • Camera MX – Photo Video Camera
  • BeautyPlus Cmaera
  • Color RollingIcon
  • Funney Meme Emoji
  • Happy Tapping
  • All-in-One Messenger

These apps have since been removed by Huawei, although if you have already installed them, be sure to manually check through your device to delete the apps, as well as associated installation packages and system files.

The Joker malware has been around for a number of years now, first emerging in 2017. It has mostly targeted apps in the Google Play Store, but with the AppGallery also listing Android mobile apps (new Huawei devices no longer have access to the Play Store or GMS), this new migration makes a degree of sense. Due to the difficulty of detecting infected apps, you’re best advised to always be on the lookout for apps that require more permissions than they should, while you should also try to avoid saving payment details in your phone if possible.

For the full report from Dr Web, click here.

[ SOURCE , 2 ]

Related reading

Recent Posts

Fake JPJePlates for EVs are now being sold openly. What is JPJ doing about it?

We have heard it many times before. Using fancy number plates for vehicles is against…

9 hours ago

BYD offers free EV Charging on 1st January 2026 at selected showrooms

BYD Cars Malaysia is offering its EV owners free charging on 1st January 2026 at…

11 hours ago

Xiaomi 17 Ultra: Leica-powered cameras with 200MP telephoto, Master Zoom Ring and Snapdragon 8 Elite Gen 5

On Christmas Day, Xiaomi officially unveiled the Xiaomi 17 Ultra, its ultimate photography-centric smartphone developed…

15 hours ago

ChargEV upgrades DC Charger at Tapah R&R Southbound to 180kW

Good news for those who need to charge their EV while travelling southbound between Ipoh…

1 day ago

TNB Electron deploys 240kW DC Charger at Wisma TNB in Ipoh

TNB Electron isn't slowing down with its EV charger deployment. The Charge Point Operator is…

1 day ago

Proton e.MAS 5 Prime: This is how the base-spec EV looks like in real life

Almost two months after it was officially launched to the market, the first batch of…

2 days ago

This website uses cookies.