The malware-containing apps are typically categorised as “toll frauds” and use “dynamic code loading” to execute the phishing attack. Consequently, the spyware uses your monthly telecom bill to sign you up for a certain premium service which you are made to pay forcefully. The so-called WAP (wireless application protocol), used by cellular networks, is the only method through which the malware functions. Through this, the malware disables your Wi-Fi or simply waits till you leave the Wi-Fi range.
Beware Android Users! A New Malware Automatically Signs up Users For Premium Subscriptions
This is where the dynamic code loading comes into play. After reading an OTP (one-time password) you received, the malicious software subscribes you to a premium service in the background, fills out the OTP field on your behalf, and hides the notification to mask its tracks. Read Also: Dangerous Android Apps That Need To Be Deleted Though, on the brighter side, Google limits the usage of dynamic code loading by apps, which means that the malware is primarily disseminated outside of Google Play. Check out? Microsoft Introduces Defender App for Windows, Android, macOS & iOS