The Latest in IT Security

Thieves in the Temple: Android.Opfake Makes Another Run


The Opfake gang can be called many things but “lazy” isn't one of them. In the digital age we live in, they are taking the analog art of social engineering to new heights. Several dummy sites have been established, acting as a front for the distribution of popular game titles.

All of the front-end sites connect back to a central back-end site that acts as a file generator or repository. The following list includes some front-end sites we have identified so far:

  • [http://]
  • [http://]
  • [http://]
  • [http://]
  • [http://]
  • [http://]
  • [http://]
  • [http://]



You’ve got to love the fact that they are now showing actual screenshots from a device playing the game in an attempt to get people to believe that the game is a legitimate copy.

Users should always pay attention to the permission requests when installing apps and, when in doubt, check for the official developer’s website for an official download link. In my next blog, Android Apps Get Hit with the Evil Twin Routine: Part 2, we will take a closer look at the common tricks that we have seen being used by dodgy apps and how to avoid them.

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments