For these attacks, crooks redirected users to pages peddling clones of Android apps like
Google Chrome for Android (chrome.apk) and Facebook (facebook.apk). These apps used excessive permissions, allowing them total access to the users'
smartphones. The apps' main purpose was to overlay login screens on top of various apps.