Mobile app stores lack the necessary mechanisms to prevent such scams, researchers from Kaspersky Lab said Last month Google offered refunds to users who bought a fake antivirus app from Google Play, but the scam seems to be catching on and security researchers have recently identified similar apps in both the Android and Windows Phone app stores.Malware analysts from Kaspersky Lab found a fake app called Kaspersky Mobile in the Windows Phone Store, which is unusual because cybercriminals tend to target Google Play and because Kaspersky doesn’t even make an antivirus product for Windows Phone.The fake app, which was available for 149 rubles or around US$4, used Kaspersky’s logo and other branding elements and even pretended to scan files when run, said Roman Unuchek, senior malware analyst at Kaspersky Lab in a blog post Thursday.Kaspersky Lab was not the only brand abused by the people behind this scam. The same developer account had created fake apps using the names and logos of other popular programs, including Avira Antivirus, Mozilla Firefox, Google Chrome, Opera Mobile, Internet Explorer and Safari. One of the developer’s fake Windows Phone apps used the same name as a fake antivirus app found in Google Play in April — Virus Shield.Despite costing $3.99 and doing nothing to protect devices, the Android version of the app was downloaded over 10,000 times and made it into several “top paid” lists before being identified as a fraud. Google removed the application and offered refunds to affected users, as well as $5 in store credit. The researchers also identified a Kaspersky-branded fake app in Google Play using the name Kaspersky Anti-Virus 2014. The app’s description was copied from the official Google Play page for Kaspersky Internet Security for Android, one of the company’s legitimate products.The app’s creators didn’t even bother to add a scan simulation to the application, Unuchek said.“It is quite possible that more and more of these fake apps will start appearing,” he said. “One thing is for sure — the mechanisms put in place by the official stores are clearly unable to combat scams like this.” Related content brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe