Proofpoint, a security firm, has discovered a malicious version of the Pokémon GO app that is available. It installs a backdoor on Android phones, allowing hackers to completely compromise a user’s device. The malicious application, or APK, was infected with DroidJack, a remote access tool (RAT) that compromises Android devices by silently opening a backdoor for hackers. It was uploaded to an online malware detection repository on July 7th. To install it, a user needs to “side-load” the malicious app by disabling an Android security setting that normally prevents the installation of unverified third-party apps from “unknown sources.”
If you’re unsure on whether you downloaded it or not, there are several ways to check. The infected version is granted more system permissions, so you can compare the permissions of your app to the real one’s. Another option is to compare the app’s SHA-1 hash, which is a long string of characters used to verify whether a file was modified by a malicious third-party. By doing so, you can see if it matches the hash of the real app.