

Trojanized apps, unlike repackaged apps, are always labeled as “malicious” as they exhibit harmful behaviors. They have the capability to display similar user interface, icon, package names, and even app labels that may easily pass as the official or legitimate version of the app they are copying. Similar to fake apps, they make use of social engineering tactics and mask official versions of apps they have spoofed to generate profit. Repackaged apps fall under a category of fake apps, used by cyber crooks in distributing mobile malware. Among the discovered fake apps, 59,185 of which were aggressive adware while 394,263 were flagged as malware. Proving to be more than just copycats, fake apps were said to be high-risk apps or malware. In a Trend Micro research, 890,482 apps were discovered coming from different sources as of April 2014. Even from official sites, risks still abound in these app-distribution platforms, enough to prey on a trusting user. To a cybercriminal, generating interest of the online public is easy by baiting users with apps that generate buzz in the mobile device-using world. These can all lead to loss of data and privacy and waste of device resources. They can persistently push ads, track and report location and other sensitive information, or subscribe users to premium services without consent. Once installed on a mobile device, fake apps can perform a variety of malicious routines.


They may also pose as quirky and attractive apps, providing interesting services like live wallpapers or real-time spying tools. These are apps in mobile devices that trick users into downloading them by using legitimate companies or popular references.
