Here’s how to check if your Pokemon GO Android app is legitimate

DroidJack Uses Side-Load…It’s Super Effective! Backdoored Pokemon GO Android App Found

Professional hackers in Jalandhar, Professional hacker in Jalandhar, Professional ethical hackers in Jalandhar, Professional Ethical hacker in Jalandhar

Here’s how to check if your Pokemon GO Android app is legitimate

From the time, Nintendo release the last game of Pokemon GO, which uses augmented reality, the gamers are going crazy. The mobile app is used by players to walk around and collect the popular characters. However, the game is geo-restricted, which means it is not available in all the countries.

As a result, many gamers out of curiosity have already started to search the app outside official app stores. Crooks are using this opportunity to exploit the popularity of the game by spreading a malicious version of the Pokemon GO app that could infect Android mobile devices and install a backdoor to gain complete control over the victim’s smartphone.

The official Pokemon GO app was first launched in Australia and New Zealand on July 4th, and later on July 6th in the U.S., but the malicious app was first uploaded to an online malware detection repository on July 7.

According to a report from security biz Proofpoint, repackaged versions of the game have been found carrying malware dubbed as DroidJack that grants remote-control access of infected devices to crooks. Also, many media outlets have published instructions on how to download the game from a third party.“The augmented reality game was first released in Australia and New Zealand on July 4th and users in other regions quickly clamoured for versions for their devices. It was released on July 6th in the US, but the rest of the world will remain tempted to find a copy outside legitimate channels. To that end, a number of publications have provided tutorials for “side-loading” the application on Android. However, as with any apps installed outside of official app stores, users may get more than they bargained for.” reported ProofPoint in a blog post.




In order to install the malicious Pokemon GO app the gamer needs to “side-load” it by disabling an Android security setting.

“Unfortunately, this is an extremely risky practice and can easily lead users to installing malicious apps on their own mobile devices,” points out Proofpoint. “Should an individual download an APK from a third party that has been infected with a backdoor, such as the one we discovered, their device would then be compromised.”

For example, the malicious Pokemon GO app requests more permissions of the legitimate one, Proofpoint says.

“Even though this APK has not been observed in the wild, it represents an important proof of concept: namely, that cybercriminals can take advantage of the popularity of applications like Pokemon GO to trick users into installing malware on their devices,” Proofpoint said.

What do I do if I my Android smartphone is infected with DroidJack?

At this point there does not appear to be a fix for the malware. Proofpoint claims the infected APK has not been spotted in the wild.




We Provide Following Service In Ethical Hacking

  • Sms / Call Spoofing
  • Android Phone Hacking
  • iPhone Hacking
  • Virus, Trojans and Backdoors
  • Remote System Hacking
  • Hacking Wifi and Wireless Networks
  • Exploiting Windows and Gaining Access
  • IP and MAC Spoofing
  • Network and Server Hacking
  • Software Cracking
  • Penetration Testing with Kali Linux
  • Metasploit Framework
  • Bypass Anti Virus System
  • Passwords Cracking
  • Facebook Hacking
  • Email Account Hacking  (Gmail / Yahoo / Hotmail / Webmail etc)
  • Mobile Hacking (Tracking, Tracing, Spying and Security)
  • Operating System Hacking (Windows, Linux, Mac)
  • Website and Database Hacking

Leave a Reply

Your email address will not be published. Required fields are marked *