{"id":211433,"date":"2025-03-26T07:48:30","date_gmt":"2025-03-26T14:48:30","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=211433"},"modified":"2025-04-01T08:00:50","modified_gmt":"2025-04-01T15:00:50","slug":"un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/","title":{"rendered":"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali"},"content":{"rendered":"<p><span data-contrast=\"auto\">I criminali informatici stanno diventando pi\u00f9 intelligenti. Ora utilizzano un kit di sviluppo chiamato <\/span><b><span data-contrast=\"auto\">.NET MAUI<\/span><\/b><span data-contrast=\"auto\"> per creare applicazioni fasulle che hanno l&#8217;aspetto e la fruibilit\u00e0 di quelle reali: applicazioni bancarie, di incontri e persino social. Ma invece di aiutarti, queste app rubano segretamente le tue informazioni private.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><\/span> <span data-contrast=\"auto\">Qui sintetizziamo la <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\">ricerca di McAfee Labs<\/a>:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><\/span> <\/p>\n<h2 data-start=\"1012\" data-end=\"1057\">Che cos&#8217;\u00e8 .NET MAUI e perch\u00e9 dovrebbe interessarci?<\/h2>\n<p> <span data-contrast=\"auto\">.NET MAUI \u00e8 uno strumento utilizzato dagli sviluppatori per creare applicazioni che funzionano su molti dispositivi, come telefoni, tablet e computer, partendo da un unico codice.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><\/span> <span data-contrast=\"auto\">Per i creatori di applicazioni \u00e8 un&#8217;ottima cosa, ma ora <\/span><b><span data-contrast=\"auto\">lo usano anche i pirati informatici<\/span><\/b><span data-contrast=\"auto\">. Sebbene McAfee sia in grado di rilevare questo malware, l&#8217;utilizzo di .NET MAUI permette di nascondere il codice pericoloso alla maggior parte dei software antivirus. Pensa a un ladro che indossa un mantello dell&#8217;invisibilit\u00e0: a meno che tu guardi davvero bene, non lo noterai.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <\/p>\n<h2 data-start=\"1522\" data-end=\"1554\">Come ti ingannano queste false applicazioni<\/h2>\n<h3 data-start=\"1556\" data-end=\"1582\">1. <strong data-start=\"1563\" data-end=\"1582\">Sembrano legittime<\/strong><\/h3>\n<p> <span data-contrast=\"auto\">Gli hacker creano delle applicazioni che sembrano provenire da aziende reali. Ad esempio, una falsa applicazione che sembrava provenire da <\/span><b><span data-contrast=\"auto\">IndusInd Bank<\/span><\/b><span data-contrast=\"auto\">, chiedeva agli utenti di inserire dati sensibili come:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><\/span> <\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Nome e cognome<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Numero di telefono<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Posta elettronica<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Data di nascita<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Dati della carta di credito<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Codici fiscali e identificativi univoci (PAN e Aadhaar).<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<p> <span data-contrast=\"auto\">Una volta che l&#8217;utente aveva premuto Invio, i dati venivano inviati direttamente al server del pirata informatico.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <\/p>\n<p data-start=\"1837\" data-end=\"1905\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-211020 size-medium\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png\" alt=\"\" width=\"134\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-457x1024.png 457w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-58x129.png 58w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM.png 604w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"1837\" data-end=\"1905\"><em><strong>Figura 1. Schermata della falsa applicazione di IndusInd Bank che chiede i dati dell&#8217;utente.<\/strong> <\/em><\/p>\n<h3 data-start=\"1907\" data-end=\"1947\">2. <strong data-start=\"1914\" data-end=\"1947\">Nascondono le cose pericolose<\/strong><\/h3>\n<p data-start=\"1949\" data-end=\"2183\"><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">Il codice delle normali applicazioni per Android \u00e8 in un <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW221053218 BCX0\">formato che gli strumenti di sicurezza<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> possono scansionare. Le applicazioni false invece <\/span><\/span><span class=\"TextRun MacChromeBold SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">occultano il proprio codice in <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">file<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> binari<\/span><\/span><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\"> in modo che <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">non<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> possa essere facilmente individuato. Questo permette alle app di permanere a lungo nel telefono, rubando tranquillamente in background.<\/span><\/span><span class=\"EOP SCXW221053218 BCX0\" data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"2190\" data-end=\"2231\">Un esempio di malware: le false applicazioni social<\/h2>\n<p> <span data-contrast=\"auto\">In un altro caso, i pirati informatici hanno creato un&#8217;app spacciandola per una piattaforma sociale. L&#8217;app, che <\/span><b><span data-contrast=\"auto\">si rivolgeva agli utenti di lingua cinese<\/span><\/b><span data-contrast=\"auto\">, era ancora pi\u00f9 insidiosa della falsa applicazione bancaria.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><\/span> <span data-contrast=\"auto\">Ecco come funzionava:<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"><\/span> <\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Rubava contatti, foto e messaggi<\/span><\/b><span data-contrast=\"auto\"> dal telefono<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span>.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilizzava un <\/span><b><span data-contrast=\"auto\">processo in tre fasi<\/span><\/b><span data-contrast=\"auto\"> per nascondere il proprio codice<\/span><span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span>.<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Crittografava tutto<\/span><\/b><span data-contrast=\"auto\">, in modo da rendere pi\u00f9 difficile la tracciabilit\u00e0<\/span>.<span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilizzava <\/span><b><span data-contrast=\"auto\">autorizzazioni strane e fasulle<\/span><\/b><span data-contrast=\"auto\"> per confondere i programmi di scansione di sicurezza<\/span>.<span data-ccp-props=\"{&quot;335559739&quot;:0}\"><\/span><\/li>\n<\/ul>\n<p> <span data-contrast=\"auto\">Inoltre, invece di utilizzare il normale traffico Internet, inviava i dati rubati attraverso canali segreti e criptati: anche se qualcuno li avesse intercettati, non avrebbe potuto leggerli.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span> <\/p>\n<p data-start=\"2650\" data-end=\"2808\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211125\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png\" alt=\"\" width=\"1024\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1536x493.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-205x66.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM.png 1776w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"2650\" data-end=\"2808\"><em><strong><span class=\"TextRun MacChromeBold SCXW202811841 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW202811841 BCX0\" data-ccp-parastyle=\"caption\">Figura 2. Varie app false che utilizzano la stessa tecnica.<\/span><\/span><\/strong><\/em><\/p>\n<h2 data-start=\"2815\" data-end=\"2851\">Da dove vengono queste applicazioni?<\/h2>\n<p data-start=\"2853\" data-end=\"2938\"><strong data-start=\"2864\" data-end=\"2900\"><span style=\"text-decoration: underline;\">Non sono presenti nel Google Play Store<\/span><\/strong> ma gli hacker le condividono tramite:<\/p>\n<ul data-start=\"2940\" data-end=\"3012\">\n<li data-start=\"2940\" data-end=\"2955\">Siti Web falsi<\/li>\n<li data-start=\"2956\" data-end=\"2972\">Applicazioni di messaggistica<\/li>\n<li data-start=\"2973\" data-end=\"3012\">Collegamenti sospetti negli SMS o nei gruppi delle chat.<\/li>\n<\/ul>\n<p data-start=\"3014\" data-end=\"3115\">Quindi, se qualcuno ti invia un link per una nuova applicazione interessante che non proviene dal Play Store, <strong data-start=\"3094\" data-end=\"3115\">fai molta attenzione<\/strong>.<\/p>\n<h2 data-start=\"3122\" data-end=\"3148\">Come proteggersi<\/h2>\n<p data-start=\"3150\" data-end=\"3188\">Ecco alcuni semplici modi per stare al sicuro:<\/p>\n<ul>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3192\" data-end=\"3239\">Scaricare le applicazioni solo dai negozi ufficiali<\/strong> come Google Play o Apple App Store.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3284\" data-end=\"3347\">Evitare di fare clic sui link provenienti da sconosciuti o da fonti non attendibili.<\/strong><\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3352\" data-end=\"3381\">Installare un software di sicurezza <\/strong>come <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_new\" rel=\"noopener\" data-start=\"3387\" data-end=\"3449\">McAfee+<\/a> per intercettare le minacce in tempo reale.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3484\" data-end=\"3523\">Mantenere aggiornate le applicazioni e i software:<\/strong> spesso gli aggiornamenti chiudono le falle nella sicurezza.<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3561\" data-end=\"3586\">Controllare i permessi concessi alle applicazioni:<\/strong> se un&#8217;app torcia elettrica vuole accedere ai tuoi messaggi, consideralo un campanello di allarme.<\/li>\n<\/ul>\n<p data-start=\"3700\" data-end=\"3836\">I criminali informatici sono sempre pi\u00f9 creativi, ma si pu\u00f2 stare un passo pi\u00f9 avanti di loro. Queste nuove minacce basate su .NET MAUI sono subdole, ma non inarrestabili.<\/p>\n<p data-start=\"3838\" data-end=\"3929\">Con abitudini intelligenti e gli strumenti giusti, puoi tenere al sicuro il tuo telefono e i tuoi dati personali. <strong data-start=\"3936\" data-end=\"3980\">Vuoi una protezione in tempo reale nel telefono? <\/strong><a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_new\" rel=\"noopener\" data-start=\"3983\" data-end=\"4054\">Scarica McAfee+<\/a> e tieni testa alle ultime minacce.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I criminali informatici stanno diventando pi\u00f9 intelligenti. Ora utilizzano un kit di sviluppo chiamato .NET MAUI per creare applicazioni fasulle&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":159135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11932],"tags":[],"coauthors":[15735],"class_list":["post-211433","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali | Il blog di McAfee<\/title>\n<meta name=\"description\" content=\"Con .NET MAUI i criminali informatici creano applicazioni fasulle che hanno l&#039;aspetto e la fruibilit\u00e0 di quelle reali.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali | Il blog di McAfee\" \/>\n<meta property=\"og:description\" content=\"Con .NET MAUI i criminali informatici creano applicazioni fasulle che hanno l&#039;aspetto e la fruibilit\u00e0 di quelle reali.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/\" \/>\n<meta property=\"og:site_name\" content=\"Il blog di McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-26T14:48:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-01T15:00:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali\",\"datePublished\":\"2025-03-26T14:48:30+00:00\",\"dateModified\":\"2025-04-01T15:00:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"articleSection\":[\"Sicurezza per dispositivi mobili\"],\"inLanguage\":\"it-IT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/\",\"name\":\"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali | Il blog di McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"datePublished\":\"2025-03-26T14:48:30+00:00\",\"dateModified\":\"2025-04-01T15:00:50+00:00\",\"description\":\"Con .NET MAUI i criminali informatici creano applicazioni fasulle che hanno l'aspetto e la fruibilit\u00e0 di quelle reali.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"width\":300,\"height\":200,\"caption\":\"malware per android\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sicurezza per dispositivi mobili\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/\",\"name\":\"Il blog di McAfee\",\"description\":\"Notizie sulla sicurezza in Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/it-it\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali | Il blog di McAfee","description":"Con .NET MAUI i criminali informatici creano applicazioni fasulle che hanno l'aspetto e la fruibilit\u00e0 di quelle reali.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"it_IT","og_type":"article","og_title":"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali | Il blog di McAfee","og_description":"Con .NET MAUI i criminali informatici creano applicazioni fasulle che hanno l'aspetto e la fruibilit\u00e0 di quelle reali.","og_url":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/","og_site_name":"Il blog di McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-03-26T14:48:30+00:00","article_modified_time":"2025-04-01T15:00:50+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali","datePublished":"2025-03-26T14:48:30+00:00","dateModified":"2025-04-01T15:00:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/"},"wordCount":639,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","articleSection":["Sicurezza per dispositivi mobili"],"inLanguage":"it-IT"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/","url":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/","name":"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali | Il blog di McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","datePublished":"2025-03-26T14:48:30+00:00","dateModified":"2025-04-01T15:00:50+00:00","description":"Con .NET MAUI i criminali informatici creano applicazioni fasulle che hanno l'aspetto e la fruibilit\u00e0 di quelle reali.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","width":300,"height":200,"caption":"malware per android"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/un-nuovo-malware-per-android-elude-le-protezioni-spacciandosi-per-applicazioni-reali\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/it-it\/"},{"@type":"ListItem","position":2,"name":"Sicurezza per dispositivi mobili","item":"https:\/\/www.mcafee.com\/blogs\/it-it\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Un nuovo malware per Android elude le protezioni spacciandosi per applicazioni reali"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#website","url":"https:\/\/www.mcafee.com\/blogs\/it-it\/","name":"Il blog di McAfee","description":"Notizie sulla sicurezza in Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/it-it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/it-it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.mcafee.com\/blogs\/it-it\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/it-it\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/posts\/211433","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/comments?post=211433"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/posts\/211433\/revisions"}],"predecessor-version":[{"id":211813,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/posts\/211433\/revisions\/211813"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/media\/159135"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/media?parent=211433"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/categories?post=211433"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/tags?post=211433"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/it-it\/wp-json\/wp\/v2\/coauthors?post=211433"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}