{"id":211408,"date":"2025-03-26T05:54:28","date_gmt":"2025-03-26T12:54:28","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=211408"},"modified":"2025-03-26T05:54:28","modified_gmt":"2025-03-26T12:54:28","slug":"un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/","title":{"rendered":"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real"},"content":{"rendered":"<p><span data-contrast=\"auto\">Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora utilizan un toolkit de desarrollo llamado <\/span><b><span data-contrast=\"auto\">.NET MAUI<\/span><\/b><span data-contrast=\"auto\"> para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales. Sin embargo, lejos de ayudarte, estas aplicaciones te roban informaci\u00f3n privada sin que lo adviertas.<\/span><\/p>\n<p><span data-contrast=\"auto\">A continuaci\u00f3n incluimos un resumen de la <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\">investigaci\u00f3n completa de McAfee Labs<\/a>.<\/span><\/p>\n<h2 data-start=\"1012\" data-end=\"1057\">\u00bfQu\u00e9 es .NET MAUI y por qu\u00e9 es importante?<\/h2>\n<p><span data-contrast=\"auto\">.NET MAUI es una herramienta que usan los desarrolladores para crear aplicaciones que funcionan en muchos dispositivos, como celulares, tablets y computadoras, a partir de un \u00fanico conjunto de c\u00f3digo.<\/span><\/p>\n<p><span data-contrast=\"auto\">Las ventajas para los creadores de aplicaciones son fant\u00e1sticas. Sin embargo, ahora <\/span><b><span data-contrast=\"auto\">tambi\u00e9n la usan los hackers<\/span><\/b><span data-contrast=\"auto\">. Aunque McAfee es capaz de detectar este malware, el uso de .NET MAUI para el desarrollo permite ocultar su peligroso c\u00f3digo ante la mayor\u00eda de los programas de software antivirus. Es como si un ladr\u00f3n llevara puesta una capa de invisibilidad; a menos que lo miremos con detenimiento, no lo veremos.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"1522\" data-end=\"1554\">C\u00f3mo nos enga\u00f1an estas apps falsas<\/h2>\n<h3 data-start=\"1556\" data-end=\"1582\">1. <strong data-start=\"1563\" data-end=\"1582\">Parecen leg\u00edtimas<\/strong><\/h3>\n<p><span data-contrast=\"auto\">Los hackers crean aplicaciones que parecen de empresas reales. Por ejemplo, una app falsa se hac\u00eda pasar por el <\/span><b><span data-contrast=\"auto\">IndusInd Bank<\/span><\/b><span data-contrast=\"auto\"> y ped\u00eda a los usuarios que brindaran informaci\u00f3n confidencial como su:<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Nombre y apellidos<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">N\u00famero de celular<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Email<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Fecha de nacimiento<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Informaci\u00f3n de tarjeta de cr\u00e9dito<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Identificadores fiscales y personales (PAN y Aadhaar)<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Al pulsar en el bot\u00f3n para enviar, esa informaci\u00f3n iba directamente al servidor del hacker.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p data-start=\"1837\" data-end=\"1905\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-211020 size-medium\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png\" alt=\"\" width=\"134\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-457x1024.png 457w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-58x129.png 58w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM.png 604w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"1837\" data-end=\"1905\"><em><strong>Figura 1. Pantalla de la app de IndusInd Bank falsa que solicita informaci\u00f3n del usuario<\/strong> <\/em><\/p>\n<h3 data-start=\"1907\" data-end=\"1947\">2. <strong data-start=\"1914\" data-end=\"1947\">Ocultan el c\u00f3digo peligroso<\/strong><\/h3>\n<p data-start=\"1949\" data-end=\"2183\"><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">El c\u00f3digo de las aplicaciones normales de Android tiene un <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW221053218 BCX0\">formato que las herramientas de seguridad<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> pueden analizar. Sin embargo, estas apps falsas <\/span><\/span><span class=\"TextRun MacChromeBold SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">ocultan su c\u00f3digo en<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> archivos <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">binarios<\/span><\/span><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">, de manera que <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">no se puede<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> detectar f\u00e1cilmente. Esto les permite permanecer en tu dispositivo m\u00e1s tiempo, robando datos en segundo plano, sin que lo adviertas.<\/span><\/span><span class=\"EOP SCXW221053218 BCX0\" data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"2190\" data-end=\"2231\">Ejemplo de malware: app falsa de redes sociales<\/h2>\n<p><span data-contrast=\"auto\">En otro caso, los hackers crearon una aplicaci\u00f3n que simulaba ser una plataforma de redes sociales. <\/span><b><span data-contrast=\"auto\">Iba dirigida a usuarios de habla china<\/span><\/b><span data-contrast=\"auto\"> y era a\u00fan m\u00e1s sofisticada que la falsa app bancaria.<\/span> <span data-contrast=\"auto\">Funcionaba as\u00ed:<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Robaba contactos, fotos y SMS<\/span><\/b><span data-contrast=\"auto\"> del celular<\/span>.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilizaba un <\/span><b><span data-contrast=\"auto\">proceso de 3 etapas<\/span><\/b><span data-contrast=\"auto\"> para ocultar su c\u00f3digo<\/span>.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Lo cifraba todo<\/span><\/b><span data-contrast=\"auto\"> para que fuera m\u00e1s dif\u00edcil seguir su rastro<\/span>.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Usaba <\/span><b><span data-contrast=\"auto\">permisos de aplicaciones extra\u00f1os y falsos<\/span><\/b><span data-contrast=\"auto\"> para confundir a las herramientas de an\u00e1lisis de seguridad<\/span>.<\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Y, en lugar de usar el tr\u00e1fico normal de Internet, enviaba los datos robados a trav\u00e9s de canales secretos cifrados, de modo que, aunque alguien los interceptara, no pudiera leerlos.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p data-start=\"2650\" data-end=\"2808\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211125\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png\" alt=\"\" width=\"1024\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1536x493.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-205x66.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM.png 1776w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"2650\" data-end=\"2808\"><em><strong><span class=\"TextRun MacChromeBold SCXW202811841 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW202811841 BCX0\" data-ccp-parastyle=\"caption\">Figura 2. Varias apps falsas que usan la misma t\u00e9cnica<\/span><\/span><\/strong><\/em><\/p>\n<h2 data-start=\"2815\" data-end=\"2851\">\u00bfDe d\u00f3nde vienen estas aplicaciones?<\/h2>\n<p data-start=\"2853\" data-end=\"2938\">Estas apps <strong data-start=\"2864\" data-end=\"2900\"><span style=\"text-decoration: underline;\">no est\u00e1n en Google Play Store<\/span><\/strong>, sino que los hackers las comparten en:<\/p>\n<ul data-start=\"2940\" data-end=\"3012\">\n<li data-start=\"2940\" data-end=\"2955\">Sitios web falsos<\/li>\n<li data-start=\"2956\" data-end=\"2972\">Aplicaciones de mensajer\u00eda<\/li>\n<li data-start=\"2973\" data-end=\"3012\">Enlaces de aspecto dudoso en mensajes de texto o grupos de chat<\/li>\n<\/ul>\n<p data-start=\"3014\" data-end=\"3115\">As\u00ed que, si alguien te env\u00eda un enlace a una atractiva app nueva que no est\u00e1 en Play Store, <strong data-start=\"3094\" data-end=\"3115\">ten mucho cuidado<\/strong>.<\/p>\n<h2 data-start=\"3122\" data-end=\"3148\">C\u00f3mo protegerse<\/h2>\n<p data-start=\"3150\" data-end=\"3188\">Estas son algunas formas sencillas de evitar riesgos:<\/p>\n<ul>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3192\" data-end=\"3239\">Descarga aplicaciones solo de tiendas oficiales<\/strong>, como Google Play o Apple App Store.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3284\" data-end=\"3347\">Evita hacer clic en enlaces enviados por personas desconocidas o procedentes de fuentes no confiables<\/strong>.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3352\" data-end=\"3381\">Instala un software de seguridad<\/strong>, como <a href=\"https:\/\/www.mcafee.com\/es-mx\/identity-theft\/protection.html?path=blogs\" target=\"_new\" rel=\"noopener\" data-start=\"3387\" data-end=\"3449\">McAfee+<\/a>, para detectar las amenazas en tiempo real.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3484\" data-end=\"3523\">Mant\u00e9n tus apps y tu software actualizados<\/strong>: las actualizaciones suelen corregir los problemas de seguridad.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3561\" data-end=\"3586\">Comprueba los permisos de las aplicaciones<\/strong>: si una aplicaci\u00f3n de linterna solicita acceso a tus SMS consid\u00e9ralo una se\u00f1al de alarma.<\/li>\n<\/ul>\n<p data-start=\"3700\" data-end=\"3836\">Los hackers son cada vez m\u00e1s creativos, pero t\u00fa puedes ir un paso por delante. Estas nuevas amenazas basadas en .NET MAUI son ingeniosas, pero no imparables.<\/p>\n<p data-start=\"3838\" data-end=\"3929\">Si adoptas buenos h\u00e1bitos y usas las herramientas adecuadas, puedes garantizar la seguridad de tu dispositivo y tu informaci\u00f3n personal. <strong data-start=\"3936\" data-end=\"3980\">\u00bfQuieres protecci\u00f3n en tiempo real en tu celular? <\/strong><a href=\"https:\/\/www.mcafee.com\/es-mx\/identity-theft\/protection.html?path=blogs\" target=\"_new\" rel=\"noopener\" data-start=\"3983\" data-end=\"4054\">Descarga McAfee+<\/a> y adel\u00e1ntate a las \u00faltimas amenazas.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora utilizan un toolkit de desarrollo llamado .NET MAUI para crear aplicaciones falsas&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":159139,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14182],"tags":[],"coauthors":[15735],"class_list":["post-211408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora usan el toolkit de desarrollo .NET MAUI para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora usan el toolkit de desarrollo .NET MAUI para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-26T12:54:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"Jasdev Dhaliwal\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real\",\"datePublished\":\"2025-03-26T12:54:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/\"},\"wordCount\":720,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"articleSection\":[\"Seguridad m\u00f3vil\"],\"inLanguage\":\"es-MX\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/\",\"name\":\"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"datePublished\":\"2025-03-26T12:54:28+00:00\",\"description\":\"Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora usan el toolkit de desarrollo .NET MAUI para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#breadcrumb\"},\"inLanguage\":\"es-MX\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"width\":300,\"height\":200,\"caption\":\"adolescenti e telefono\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad m\u00f3vil\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-MX\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-mx\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real | Blog de McAfee","description":"Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora usan el toolkit de desarrollo .NET MAUI para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_MX","og_type":"article","og_title":"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real | Blog de McAfee","og_description":"Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora usan el toolkit de desarrollo .NET MAUI para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales.","og_url":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-03-26T12:54:28+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Escrito por":"Brooke Seipel","Tiempo de lectura":"4 minutes","Written by":"Jasdev Dhaliwal"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real","datePublished":"2025-03-26T12:54:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/"},"wordCount":720,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","articleSection":["Seguridad m\u00f3vil"],"inLanguage":"es-MX"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/","url":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/","name":"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","datePublished":"2025-03-26T12:54:28+00:00","description":"Los ciberdelincuentes son cada vez m\u00e1s astutos. Ahora usan el toolkit de desarrollo .NET MAUI para crear aplicaciones falsas que parecen reales, como apps bancarias, de citas e incluso de redes sociales.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#breadcrumb"},"inLanguage":"es-MX","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/"]}]},{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","width":300,"height":200,"caption":"adolescenti e telefono"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/un-nuevo-malware-para-android-burla-la-seguridad-haciendose-pasar-por-una-app-real\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-mx\/"},{"@type":"ListItem","position":2,"name":"Seguridad m\u00f3vil","item":"https:\/\/www.mcafee.com\/blogs\/es-mx\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Un nuevo malware para Android burla la seguridad haci\u00e9ndose pasar por una app real"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-mx\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-mx\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-MX"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-mx\/","logo":{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.mcafee.com\/blogs\/es-mx\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/es-mx\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/posts\/211408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/comments?post=211408"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/posts\/211408\/revisions"}],"predecessor-version":[{"id":211410,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/posts\/211408\/revisions\/211410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/media\/159139"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/media?parent=211408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/categories?post=211408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/tags?post=211408"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-mx\/wp-json\/wp\/v2\/coauthors?post=211408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}