Malicious travel apps — fake translators and currency converters stealing your data

Malicious Travel Apps: The Fake Translators, Currency Converters, and Itinerary Helpers Stealing Your Data

You’re standing in a Madrid metro station trying to read a route map you can’t translate. You search the App Store for “translator,” see a free option with a 4.6-star rating, install it, and grant the camera permission so you can point your phone at the sign. The app works perfectly — fast, accurate, beautiful interface.

What you don’t see: the same app is silently uploading every photo your camera takes, scraping your contact list, harvesting your saved Wi-Fi passwords, and selling the data to a network you’ll never identify. Three weeks later, scam calls start hitting people in your contact list using your name. Six weeks later, your bank notices unfamiliar logins from Eastern Europe.

The “fake utility app” category is one of the highest-volume malware delivery vectors targeting travelers in 2026. Translators, currency converters, offline maps, language phrasebooks, ATM finders, and “free Wi-Fi finder” apps all routinely show up on app-store search results with mixed legitimacy. Some are genuinely useful. Some are aggressive ad-fraud platforms that work fine but exfiltrate your data.

A few are outright malware in convincing wrappers — like the Nitrokod cryptomining campaign, which disguised itself as a fake Google Translate desktop app and ran undetected for years. This guide walks through how to identify the dangerous ones, the permissions that should always trigger refusal, and the vetted alternatives that do the same job safely.

Why Travelers Are Specifically Targeted by Fake Utility Apps

Three things make travelers an unusually rich audience for malicious utility apps. Attackers know all three and design accordingly.

You’re searching with urgency. The mental state when you’re standing at a foreign metro station trying to read a sign is the opposite of careful evaluation. You want a working tool right now, you’ll grant any permission to make it work, and you’ll skip the developer-name check that would have caught the fake.

You’re installing apps you’d never install at home. A travel translator, an offline currency converter, a foreign-city subway map — these are needs that emerge specifically during travel, often from search results rather than recommendations. Attackers know this and stuff app stores with options that target precisely those queries.

The data you’ll grant access to is unusually valuable. A camera permission grants real-time photo access — including pictures of passports, hotel keys, and credit cards. A contacts permission turns into a phishing target list. A location permission combined with travel context tells an attacker exactly where you’ll be and when. The data attackers harvest from a traveler’s phone is worth more than data harvested from a homebody.

The Five Travel-App Categories Most Often Weaponized

1. Translators

Fake translation apps are the #1 category in the fake-utility space. The Nitrokod campaign disguised itself as a Google Translate desktop installer and used the app’s perceived legitimacy to run cryptomining and data-theft code on victim machines. Mobile translation apps that aren’t from Google, Microsoft, DeepL, or Apple are worth significant scrutiny — especially if they appeared on the store recently or have suspiciously generic developer names.

Vetted alternatives: Google Translate (Google LLC), Microsoft Translator (Microsoft Corporation), DeepL (DeepL SE), and Apple’s built-in Translate (iOS only). Each has a known corporate developer, a long publication history, and a privacy policy that’s been independently reviewed.

2. Currency converters

“Currency Converter PRO,” “Currency Converter 2 Go,” and many siblings have repeatedly been flagged for excessive permissions, browser hijacking behavior, and data harvesting. The legitimate versions of currency conversion are simple math operations that need almost no permissions to function. Any currency app requesting access to contacts, location, microphone, camera, or files should be uninstalled immediately.

Vetted alternatives: XE.com (Euronet Worldwide), OANDA, Wise (formerly TransferWise). Built-in tools also work — both Google and Apple’s calculator apps now do live currency conversion.

3. Offline maps and city guides

Travelers want offline maps to avoid roaming charges. Fake versions of “Madrid Metro Map” or “Tokyo Subway Offline” appear and disappear on the stores constantly. The good ones are made by transit authorities or established travel publishers; the bad ones are AI-generated wrappers around scraped content with embedded ad-fraud frameworks.

Vetted alternatives: Google Maps offline (download regions before you go), Apple Maps offline, Maps.me, Citymapper, official transit-authority apps for major cities (TfL for London, NYC MTA, etc.).

4. “Free Wi-Fi finder” apps

The category exists in a permanent gray zone. Some apps legitimately catalog open Wi-Fi networks; others crowdsource credentials to hotel and corporate networks (a TOS violation at minimum), and a few are outright malware harvesters. Even the legitimate ones often need permissions far broader than the function requires — location, network access, sometimes contacts.

Vetted alternatives: Honestly, skip the category. Use your hotel’s official Wi-Fi (with a VPN), tether to your phone’s eSIM data plan, or pay for airport Wi-Fi when needed. The risk-reward of a free Wi-Fi finder is poor.

5. “VPN” apps from unknown publishers

Travelers know they need a VPN, but the ones that show up in app-store search results “Free VPN” are mostly compromised. Many are subsidized by ad networks; some have been caught funneling traffic through residential-IP proxy networks (turning your phone into part of a botnet). Free VPNs from unknown publishers are not a defense — they’re often the threat.

Vetted alternatives: NordVPN, ExpressVPN, Mullvad, Proton VPN. Each has a well-known corporate parent, an independently audited no-logs policy, and a paid model that aligns incentives with user privacy. (More on choosing a travel VPN in our Faraday Bags, RFID Sleeves, and Travel VPNs guide.)

🛡️ Scam Detection Training

Could You Spot a Scam in the Wild?

Phishing, smishing, vishing, fake apps, crypto cons — scammers know every angle. Train your instincts with real-world scenarios across 12 scam categories. Split-second decisions. Earn XP. Build streaks. Stay safe.

▶ Start the Challenge →

5-question rounds · Earn XP · Free to play

The Permission Red Flags That Should Always Trigger Refusal

App store ratings can be gamed. Reviews can be fake. The single most reliable signal of a malicious app is its permission requests. Here are the requests that should immediately end the install.

Currency converter asking for contacts, camera, microphone, or location. A currency converter is math. It needs no personal data. Any of these requests is a tell.

Translator asking for contacts, SMS, call logs, or device admin rights. A translator needs camera (for visual translation), microphone (for voice translation), and possibly storage. It does not need your contacts.

Offline map asking for contacts, microphone, or accessibility services. Maps need location and storage. Anything else, especially accessibility services (which let an app read every other app’s content), is a hard no.

Any utility app asking for accessibility services. Accessibility was designed for users with disabilities. It’s been weaponized by attackers because it lets an app read screen content from every other app on the device. Banking trojans love accessibility. If a non-accessibility app requests this, decline and uninstall.

Any “free” tool requesting payment information. Free should be free. A payment request mid-install is a phishing pattern.

How to Vet an App Before You Install It

The five-step vetting routine takes about a minute and catches almost every fake.

  1. Check the developer name. Look at who publishes the app. “Google LLC” and “Microsoft Corporation” are easy. “Translate-App-Studio” or “Best Free Tools Inc” with no website behind them is suspicious. Tap the developer name to see what else they’ve published.
  2. Check the install count and review distribution. Established apps have hundreds of thousands or millions of installs and reviews spread across years. Brand-new apps with a thousand 5-star reviews and zero negative ones are paid review patterns.
  3. Read the recent negative reviews. Sort reviews by lowest first. Real users complain about real things — bugs, broken features, poor design. Fake apps often have negative reviews mentioning “started showing weird ads,” “asks for too many permissions,” or “data leak.”
  4. Visit the developer’s website. Real publishers have real websites with real about pages. Fly-by-night publishers have GitHub-pages-style domains, no contact information, and grammar that suggests AI-generated content.
  5. Search the app name plus “scam” or “malware.” If multiple users have flagged the app on forums, Reddit, or security blogs, it shows up in search results. A 30-second search saves a lot of cleanup.

If You’ve Already Installed Something Suspicious

Don’t panic — quick action contains most of the damage.

Uninstall immediately. Long-press the app icon and tap Uninstall (Android) or hold and tap the X (iPhone). On Android, also revoke any “device admin” or “accessibility” permissions the app may have grabbed before uninstalling — Settings → Security → Device admin apps and Settings → Accessibility.

Run a security scan. Apple’s iOS doesn’t typically have this risk because of sandboxing — uninstalling cleans most of the damage. Android users should run Google Play Protect (Settings → Security → Google Play Protect → Scan) and consider a free reputable scanner like Malwarebytes Mobile.

Change passwords for any account you used while the app was installed. Email, banking, social media. Use unique strong passwords from your password manager. Enable MFA everywhere it isn’t already enabled.

Watch your accounts for 90 days. Like other forms of post-trip fraud, malicious-app data harvests show up days or weeks later. Set transaction alerts to $1, watch your statements, and pull your credit reports at annualcreditreport.com to check for unfamiliar accounts.

Report the app. Report malicious apps to Apple (Report a Concern in App Store) and Google (Flag as Inappropriate in Google Play). Every report contributes to the platform’s enforcement against the publisher.

The Pre-Trip “App Trust List” Approach

Rather than searching the store while you’re standing at a foreign metro station, build your travel app set before the trip. The week before departure, install and test:

  • One translator (Google Translate or Apple Translate)
  • One currency converter (XE or your bank’s app)
  • One offline maps app with the destination region pre-downloaded
  • One reputable VPN
  • The destination’s official transit authority app, if relevant
  • Your bank’s app and your card issuer’s fraud-line dial-by-app

Test each one on home Wi-Fi. Confirm permissions are minimal. Disable any that ask for excessive access. By the time you board the plane, you have a vetted toolkit and no need to install anything new under pressure.

Frequently Asked Questions

Aren’t apps from the official App Store and Google Play already vetted?

Partially. Both stores run automated and manual review processes, but malicious apps regularly slip through, especially in the “utility” category where the line between aggressive ad-fraud and outright malware is blurry. The 2022 Nitrokod campaign ran on Google search results for years before being caught. Don’t rely solely on store curation.

Is iOS truly safer than Android for installing utility apps?

Yes, on average. iOS sandboxing prevents most apps from accessing each other’s data, and the App Store review process is more aggressive than Google Play’s. Android’s openness means a malicious app can do more damage if granted broad permissions, and the wider Android ecosystem (third-party app stores, sideloaded APKs) has weaker controls. But neither is malware-proof.

Can my carrier or VPN provider see what apps I’m using?

Your carrier sees connection metadata; a reputable VPN encrypts the contents of your traffic but the VPN provider can technically see app traffic patterns. Use a VPN with a strong, audited no-logs policy (Mullvad, Proton VPN, NordVPN). The threat from compromised carrier infrastructure or surveillance is real but rare for ordinary travelers.

What about app-store reviews — can I trust the star rating?

Aggregate ratings can be gamed, especially for new apps. Read the recent negative reviews specifically — those are harder to fake and tend to surface real problems. Long-time apps with reviews stretching back years are more trustworthy than newcomers with thousands of overnight 5-star ratings.

Should I worry about web browser extensions when traveling?

Yes. Browser extensions have similar risks to mobile apps and are equally easy to fake. Currency converter and translation extensions have repeatedly been caught injecting ads, redirecting search results, or harvesting data. Audit your extensions before traveling and remove anything you don’t actively use. Treating your data as the asset it is applies on the desktop too.

The Bottom Line: Vet Before You Need It

Malicious travel apps work because they exploit the moment when you need a tool right now and have no patience for evaluation. The defense is to do the evaluation in advance — build your travel app toolkit at home the week before the trip, vetted from established developers with appropriate permissions. Once you arrive, don’t search-and-install. Use what you brought.

Want to keep training your fake-app radar? Try the Scam Detection Challenge — many of the patterns that flag fake apps also flag fake websites, fake emails, and fake calls — or subscribe to the Making Sense of Security newsletter for ongoing scam-pattern briefings.

Similar Posts