Security researchers discovered more than 32,000 fraudulent Black Friday apps in the wild, many of which use the branding of the top five U.S. online retailers to spread malware and steal customer credentials.

According to RiskIQ’s “2017 Black Friday E-Commerce Blacklist,” which was derived from a data set of 2 billion daily HTTP requests, 20 million mobile apps, 300 million domain records and 783 locations across more than 100 countries, about 1 in 25 Black Friday apps available in global app stores are malicious. Researchers also discovered at least 15 fraudulent apps that use the branding of the top five online retail companies to dupe users into divulging their sensitive data.

App Store Security Is Not Bulletproof

Black Friday is a huge day for e-commerce. According to the RiskIQ report, in 2016 154 million consumers did their Black Friday shopping online, spending $5.27 billion, which represented a 17.7 percent increase year over year. Mobile revenue alone totaled $1.2 billion, representing a growth rate of 33 percent year over year. Overall, nearly 40 percent of sales occurred on a mobile device during last year’s Black Friday weekend.

The report found that even some of the most popular app stores featured malicious Black Friday apps. The Google Play store hosted the largest number of fraudulent apps, while Apple’s App Store contained 85 legitimate apps that had been infected with malware despite rigorous security testing. The report pointed out that although most official mobile app stores have relatively strong verification processes in place, these systems are “not bulletproof.”

While the volume of blacklisted apps declined by 40 percent from Q1 to Q2 2017, suggesting a global boost in security awareness, these apps still put less savvy online shoppers and retailers at risk of fraud during the holiday shopping season.

Avoiding Fishy Black Friday Apps

To mitigate the risks from these malicious apps, RiskIQ advised users to avoid downloading applications that request questionable permissions to access data such as contact lists, text messages, administrative features, stored passwords and credit card information. Users should also be wary of app developers who use free email services such as Gmail.

The most obvious and important takeaway from the report is that consumers must be particularly proactive about their online security during the bustling holiday season.

More from

Will the 2.5M Records Breach Impact Student Loan Relief?

Over 2.5 million student loan accounts were breached in the summer of 2022, according to a recent Maine Attorney General data breach notification. The target of the breach was Nelnet Servicing, a servicing system and web portal provider for the Oklahoma Student Loan Authority (OSLA) and EdFinancial. An investigation determined that intruders accessed student loan account registration information between June and July 2022. The stolen data includes names, addresses, emails, phone numbers and social security numbers for 2,501,324 student loan…

Containers, Security, and Risks within Containerized Environments

Applications have historically been deployed and created in a manner reminiscent of classic shopping malls. First, a developer builds the mall, then creates the various stores inside. The stores conform to the dimensions of the mall and operate within its floor plan. In older approaches to application development, a developer would have a targeted system or set of systems for which they intend to create an application. This targeted system would be the mall. Then, when building the application, they would…

Inside the Second White House Ransomware Summit

Ransomware is a growing, international threat. It's also an insidious one. The state of the art in ransomware is simple but effective. Well-organized criminal gangs hiding in safe-haven countries breach an organization, find, steal and encrypt important files. Then they present victims with the double incentive that, should they refuse to pay, their encrypted files will be both deleted and made public. In addition to hundreds of major attacks around the world, two critical ransomware incidents — the Colonial Pipeline…

Did Brazil DSL Modem Attacks Change Device Security?

From 2011 to 2012, millions of Internet users in Brazil fell victim to a massive attack against vulnerable DSL modems. By configuring the modems remotely, attackers could redirect users to malicious domain name system (DNS) servers. Victims trying to visit popular websites (Google, Facebook) were instead directed to imposter sites. These rogue sites then installed malware on victims' computers. According to a report from Kaspersky Lab Expert Fabio Assolini citing statistics from Brazil's Computer Emergency Response Team, the attack ultimately…