{"id":211708,"date":"2025-03-31T04:11:20","date_gmt":"2025-03-31T11:11:20","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=211708"},"modified":"2025-03-31T04:11:20","modified_gmt":"2025-03-31T11:11:20","slug":"novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/","title":{"rendered":"Novo malware para Android ilude seguran\u00e7a ao fingir ser aplica\u00e7\u00e3o leg\u00edtima"},"content":{"rendered":"<p><span data-contrast=\"auto\">Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado<\/span><b><span data-contrast=\"auto\">.NET MAUI<\/span><\/b><span data-contrast=\"auto\"> (malware) para criar aplica\u00e7\u00f5es falsas que se assemelham \u00e0s reais &#8211; desde aplica\u00e7\u00f5es de bancos a redes sociais e at\u00e9 plataformas de encontros. Mas em vez de o ajudar, estas aplica\u00e7\u00f5es roubam secretamente as suas informa\u00e7\u00f5es privadas.<\/span> <span data-contrast=\"auto\">Analisamos <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\">a investiga\u00e7\u00e3o completa do McAfee Labs<\/a> aqui:<\/span><\/p>\n<h2 data-start=\"1012\" data-end=\"1057\">O que \u00e9 o .NET MAUI e porque se deve preocupar?<\/h2>\n<p><span data-contrast=\"auto\">O .NET MAUI \u00e9 uma ferramenta utilizada pelos programadores para criar aplica\u00e7\u00f5es que funcionam em v\u00e1rios dispositivos, como telem\u00f3veis, tablets e computadores, tudo a partir de um conjunto de c\u00f3digo.<\/span> <span data-contrast=\"auto\">Isso \u00e9 \u00f3timo para os criadores de aplica\u00e7\u00f5es. Mas agora, <\/span><b><span data-contrast=\"auto\">os hackers tamb\u00e9m o est\u00e3o a utilizar<\/span><\/b><span data-contrast=\"auto\">. <\/span><\/p>\n<p><span data-contrast=\"auto\">Embora o McAfee seja capaz de detetar este malware, a decis\u00e3o de construir com .NET MAUI ajuda a esconder o seu c\u00f3digo perigoso da maioria dos softwares antiv\u00edrus. Pense nisso como um ladr\u00e3o que usa um manto de invisibilidade: a menos que esteja realmente a olhar, n\u00e3o o ver\u00e1.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"1522\" data-end=\"1554\">Como estas aplica\u00e7\u00f5es falsas enganam os utilizadores<\/h2>\n<h3 data-start=\"1556\" data-end=\"1582\">1. <strong data-start=\"1563\" data-end=\"1582\">Parecem leg\u00edtimas<\/strong><\/h3>\n<p><span data-contrast=\"auto\">Os hackers est\u00e3o a criar aplica\u00e7\u00f5es que parecem ser de empresas reais. Por exemplo, uma aplica\u00e7\u00e3o falsa fingia ser o <\/span><b><span data-contrast=\"auto\">IndusInd Bank<\/span><\/b><span data-contrast=\"auto\">, pedindo aos utilizadores que introduzissem informa\u00e7\u00f5es confidenciais como:<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Nome completo<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">N\u00famero de telefone<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">E-mail<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Data de nascimento<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><span data-contrast=\"auto\">Informa\u00e7\u00f5es do cart\u00e3o de cr\u00e9dito<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"4\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><span data-contrast=\"auto\">Identificadores fiscais e pessoais \u00fanicos (PAN e Aadhaar)<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Assim que envia os dados, eles v\u00e3o diretamente para o servidor do hacker.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p data-start=\"1837\" data-end=\"1905\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-211020 size-medium\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png\" alt=\"\" width=\"134\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-457x1024.png 457w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-58x129.png 58w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM.png 604w\" sizes=\"auto, (max-width: 134px) 100vw, 134px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"1837\" data-end=\"1905\"><em><strong>Figura 1. Ecr\u00e3 da aplica\u00e7\u00e3o falsa do IndusInd Bank que pede informa\u00e7\u00f5es ao utilizador<\/strong> <\/em><\/p>\n<h3 data-start=\"1907\" data-end=\"1947\">2. <strong data-start=\"1914\" data-end=\"1947\">As aplica\u00e7\u00f5es escondem as partes perigosas<\/strong><\/h3>\n<p data-start=\"1949\" data-end=\"2183\"><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">As aplica\u00e7\u00f5es Android normais t\u00eam c\u00f3digo num <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW221053218 BCX0\">formato que as ferramentas de seguran\u00e7a<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> podem analisar. Estas aplica\u00e7\u00f5es falsas <\/span><\/span><span class=\"TextRun MacChromeBold SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\">escondem o seu c\u00f3digo em<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">ficheiros<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> bin\u00e1rios <\/span><\/span><span class=\"TextRun SCXW221053218 BCX0\" lang=\"EN-GB\" xml:lang=\"EN-GB\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW221053218 BCX0\"> para que <\/span><span class=\"NormalTextRun SCXW221053218 BCX0\">n\u00e3o<\/span><span class=\"NormalTextRun SCXW221053218 BCX0\"> possam ser facilmente detetadas. Isto permite-lhes permanecer no seu telem\u00f3vel durante mais tempo, roubando silenciosamente em segundo plano.<\/span><\/span><span class=\"EOP SCXW221053218 BCX0\" data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<h2 data-start=\"2190\" data-end=\"2231\">Exemplo de malware: aplica\u00e7\u00e3o falsa de redes sociais<\/h2>\n<p><span data-contrast=\"auto\">Noutro caso, os hackers criaram uma aplica\u00e7\u00e3o que se fazia passar por uma plataforma de redes sociais. Este <\/span><b><span data-contrast=\"auto\">visava os utilizadores de l\u00edngua chinesa<\/span><\/b><span data-contrast=\"auto\"> e era ainda mais complicado do que a falsa aplica\u00e7\u00e3o banc\u00e1ria.<\/span> <span data-contrast=\"auto\">Eis o que fez:<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Roubou contactos, fotografias e SMS<\/span><\/b><span data-contrast=\"auto\"> do telem\u00f3vel<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilizou um <\/span><b><span data-contrast=\"auto\">processo de 3 fases<\/span><\/b><span data-contrast=\"auto\"> para ocultar o seu c\u00f3digo<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Encriptou tudo<\/span><\/b><span data-contrast=\"auto\"> para que seja mais dif\u00edcil de localizar<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Utilizou <\/span><b><span data-contrast=\"auto\">permiss\u00f5es de aplica\u00e7\u00f5es estranhas e falsas<\/span><\/b><span data-contrast=\"auto\"> para confundir os analisadores de seguran\u00e7a<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">E em vez de utilizar o tr\u00e1fego normal da Internet, enviava os dados roubados atrav\u00e9s de canais encriptados secretos, assim, mesmo que algu\u00e9m os interceptasse, n\u00e3o os poderia ler.<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p data-start=\"2650\" data-end=\"2808\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211125\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png\" alt=\"\" width=\"1024\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1536x493.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-205x66.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM.png 1776w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\" data-start=\"2650\" data-end=\"2808\"><em><strong><span class=\"TextRun MacChromeBold SCXW202811841 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW202811841 BCX0\" data-ccp-parastyle=\"caption\">Figura 2. V\u00e1rias aplica\u00e7\u00f5es falsas utilizando a mesma t\u00e9cnica<\/span><\/span><\/strong><\/em><\/p>\n<h2 data-start=\"2815\" data-end=\"2851\">De onde v\u00eam estas aplica\u00e7\u00f5es?<\/h2>\n<p data-start=\"2853\" data-end=\"2938\">Estas aplica\u00e7\u00f5es <strong data-start=\"2864\" data-end=\"2900\"><span style=\"text-decoration: underline;\">n\u00e3o est\u00e3o na Google Play Store<\/span>.<\/strong> Em vez disso, os hackers est\u00e3o a partilh\u00e1-los:<\/p>\n<ul data-start=\"2940\" data-end=\"3012\">\n<li data-start=\"2940\" data-end=\"2955\">Web sites falsos<\/li>\n<li data-start=\"2956\" data-end=\"2972\">Aplica\u00e7\u00f5es de mensagens<\/li>\n<li data-start=\"2973\" data-end=\"3012\">Liga\u00e7\u00f5es duvidosas em SMS ou grupos de conversa\u00e7\u00e3o<\/li>\n<\/ul>\n<p data-start=\"3014\" data-end=\"3115\">Por isso, se algu\u00e9m lhe enviar uma liga\u00e7\u00e3o para uma nova aplica\u00e7\u00e3o interessante que n\u00e3o seja da Play Store, tenha <strong data-start=\"3094\" data-end=\"3115\">muito cuidado.<\/strong><\/p>\n<h2 data-start=\"3122\" data-end=\"3148\">Como se proteger<\/h2>\n<p data-start=\"3150\" data-end=\"3188\">Veja como se proteger de forma simples:<\/p>\n<ul>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3192\" data-end=\"3239\">Transfira aplica\u00e7\u00f5es apenas de lojas de aplica\u00e7\u00f5es oficiais<\/strong> como o Google Play ou a Apple App Store<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3284\" data-end=\"3347\">Evite clicar em liga\u00e7\u00f5es de estranhos ou de fontes n\u00e3o confi\u00e1veis<\/strong><\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3352\" data-end=\"3381\">Instale software de seguran\u00e7a<\/strong> como o <a href=\"https:\/\/www.mcafee.com\/pt-pt\/antivirus\/mcafee-total-protection.html\" target=\"_new\" rel=\"noopener\" data-start=\"3387\" data-end=\"3449\">McAfee Total Protection<\/a> para detetar amea\u00e7as em tempo real<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3484\" data-end=\"3523\">Mantenha as suas aplica\u00e7\u00f5es e software atualizados: <\/strong>as atualiza\u00e7\u00f5es corrigem frequentemente falhas de seguran\u00e7a<\/li>\n<li data-start=\"3190\" data-end=\"3654\"><strong data-start=\"3561\" data-end=\"3586\">Verifique as permiss\u00f5es das aplica\u00e7\u00f5es:<\/strong> se uma aplica\u00e7\u00e3o de lanterna quiser aceder aos seus SMS, \u00e9 um sinal de alerta<\/li>\n<\/ul>\n<p data-start=\"3700\" data-end=\"3836\">Os hackers est\u00e3o cada vez mais criativos, mas pode manter-se um passo \u00e0 frente. Estas novas amea\u00e7as baseadas no .NET MAUI s\u00e3o sorrateiras, mas n\u00e3o s\u00e3o impar\u00e1veis.<\/p>\n<p data-start=\"3838\" data-end=\"3929\">Com h\u00e1bitos inteligentes e as ferramentas certas, pode manter o seu telem\u00f3vel e as suas informa\u00e7\u00f5es pessoais em seguran\u00e7a. <strong data-start=\"3936\" data-end=\"3980\">Quer prote\u00e7\u00e3o em tempo real no seu telem\u00f3vel? <\/strong><a href=\"https:\/\/www.mcafee.com\/pt-pt\/antivirus\/mcafee-total-protection.html\" target=\"_new\" rel=\"noopener\" data-start=\"3983\" data-end=\"4054\">Transfira o McAfee Total Protection<\/a> e fique \u00e0 frente das amea\u00e7as mais recentes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar aplica\u00e7\u00f5es falsas&#8230;<\/p>\n","protected":false},"author":1440,"featured_media":159138,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[14374],"tags":[],"coauthors":[15735],"class_list":["post-211708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Novo malware para Android ilude seguran\u00e7a como aplica\u00e7\u00e3o leg\u00edtima<\/title>\n<meta name=\"description\" content=\"Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Novo malware para Android ilude seguran\u00e7a como aplica\u00e7\u00e3o leg\u00edtima\" \/>\n<meta property=\"og:description\" content=\"Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogue da McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-31T11:11:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Seipel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n\t<meta name=\"twitter:label3\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data3\" content=\"Jasdev Dhaliwal\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/\"},\"author\":{\"name\":\"Brooke Seipel\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/e0177129df164a74082f47397af3e729\"},\"headline\":\"Novo malware para Android ilude seguran\u00e7a ao fingir ser aplica\u00e7\u00e3o leg\u00edtima\",\"datePublished\":\"2025-03-31T11:11:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/\"},\"wordCount\":748,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"articleSection\":[\"Seguran\u00e7a da Internet\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/\",\"name\":\"Novo malware para Android ilude seguran\u00e7a como aplica\u00e7\u00e3o leg\u00edtima\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"datePublished\":\"2025-03-31T11:11:20+00:00\",\"description\":\"Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg\",\"width\":300,\"height\":200,\"caption\":\"adolescenti e telefono\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguran\u00e7a da Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Novo malware para Android ilude seguran\u00e7a ao fingir ser aplica\u00e7\u00e3o leg\u00edtima\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/\",\"name\":\"Blogue da McAfee\",\"description\":\"Not\u00edcias sobre seguran\u00e7a na Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/e0177129df164a74082f47397af3e729\",\"name\":\"Brooke Seipel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg\",\"caption\":\"Brooke Seipel\"},\"description\":\"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/pt-pt\/author\/brooke-seipel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Novo malware para Android ilude seguran\u00e7a como aplica\u00e7\u00e3o leg\u00edtima","description":"Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_PT","og_type":"article","og_title":"Novo malware para Android ilude seguran\u00e7a como aplica\u00e7\u00e3o leg\u00edtima","og_description":"Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar...","og_url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/","og_site_name":"Blogue da McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-03-31T11:11:20+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","type":"image\/jpeg"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Escrito por":"Brooke Seipel","Tempo estimado de leitura":"4 minutes","Written by":"Jasdev Dhaliwal"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/"},"author":{"name":"Brooke Seipel","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/e0177129df164a74082f47397af3e729"},"headline":"Novo malware para Android ilude seguran\u00e7a ao fingir ser aplica\u00e7\u00e3o leg\u00edtima","datePublished":"2025-03-31T11:11:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/"},"wordCount":748,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","articleSection":["Seguran\u00e7a da Internet"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/","name":"Novo malware para Android ilude seguran\u00e7a como aplica\u00e7\u00e3o leg\u00edtima","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","datePublished":"2025-03-31T11:11:20+00:00","description":"Os cibercriminosos est\u00e3o a ficar mais inteligentes. Agora, utilizam o kit de desenvolvimento chamado.NET MAUI (malware) para criar...","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/09\/300x200_Blog_phonetracking.jpg","width":300,"height":200,"caption":"adolescenti e telefono"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/novo-malware-para-android-ilude-seguranca-ao-fingir-ser-aplicacao-legitima\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/"},{"@type":"ListItem","position":2,"name":"Seguran\u00e7a da Internet","item":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Novo malware para Android ilude seguran\u00e7a ao fingir ser aplica\u00e7\u00e3o leg\u00edtima"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#website","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/","name":"Blogue da McAfee","description":"Not\u00edcias sobre seguran\u00e7a na Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/e0177129df164a74082f47397af3e729","name":"Brooke Seipel","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/#\/schema\/person\/image\/ac03c1083bbdcd2cbb0675dc29c62cbe","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/01\/1693283531327-96x96.jpg","caption":"Brooke Seipel"},"description":"Brooke Seipel is the Content Editor in Chief at McAfee, where she leads the company's content strategy with a focus on cybersecurity education. With a decade of experience in audience development and digital content, Brooke has a strong understanding of online audiences, emerging trends, and the evolving cyber landscape. Before joining McAfee, Brooke led audience teams and served as both a reporter and editor at numerous award-winning publications including Fortune, The Hill, International Business Times, New Republic, and The OC Register. Brooke is dedicated to providing insightful, actionable content that empowers readers to make informed decisions about their digital safety. When she's not immersed in the world of cybersecurity, you can find her scrolling social media endlessly, soaking up the latest trends, and also volunteering as a naturalist.","url":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/author\/brooke-seipel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts\/211708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/users\/1440"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/comments?post=211708"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts\/211708\/revisions"}],"predecessor-version":[{"id":211710,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/posts\/211708\/revisions\/211710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/media\/159138"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/media?parent=211708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/categories?post=211708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/tags?post=211708"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/pt-pt\/wp-json\/wp\/v2\/coauthors?post=211708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}