The code is hidden in millions of prayer applications used for Muslims that secretly spy on users. Google has now removed the offer from the Play Store.
Two security researchers have found the code in several prayer processors for Muslims, which, among others, could be used to collect phone numbers, email addresses and the exact location of users without their permission. You can also read the contents of the clipboard where passwords are often stored.
This code is part of the Software Development Tool (SDK). Usually such SDKs collect data for advertising purposes, but in this case it is different. The SDK was developed by Panama-based Measurement Systems.
According to However, the “Wall Street Journal” is a leading American company called Vostrom, which acts as a contractor for several U.S. intelligence services and US security agencies. US security agencies may have different applications for the types of data collected.
Data mainly from the Middle East
Measurement systems revealed abnormal behavior. Above all, it wants data from app developers nearby and from users in the Middle East, Eastern Europe and Asia. However, in general, users in Western Europe and North America are in high demand when collecting data for advertising purposes due to their high purchasing power.
The SDK is built into dozens of applications. However, Al-Mosin Lite, which reminds us of the prayer times of Islamists, topped the list with ten million users. Another application with five million users indicates the direction towards Mecca. Removed infected apps from the Google Play Store on March 25th.
Not for the first time, it has been revealed that companies affiliated with US authorities have primarily developed spy operations on processors used by Muslims. An almost identical case was discovered in 2020. The U.S. Department of Defense has already acknowledged that it buys utility behavior data from private providers.
“Amateur coffee fan. Travel guru. Subtly charming zombie maven. Incurable reader. Web fanatic.”