---
title: "How Something Meant to Protect Your Mobile Device is Being Used to Phish You | Phish Protection"
description: "Since mobile devices are essentially computers, it didn’t take long to figure out they needed to be protected like computers."
image: "https://phishprotection.com/og/blog/how-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you.png"
canonical: "https://phishprotection.com/blog/how-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you/"
---

Quick Answer

Since mobile devices are essentially computers, \_it didn’t take long to figure out they needed to be protected like computers\_. That's especially true given how frequently users download apps from the app store onto their mobile devices.

Share 

[ ](https://www.linkedin.com/sharing/share-offsite/?url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fhow-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you%2F "Share on LinkedIn") [ ](https://twitter.com/intent/tweet?text=How%20Something%20Meant%20to%20Protect%20Your%20Mobile%20Device%20is%20Being%20Used%20to%20Phish%20You&url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fhow-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you%2F "Share on X/Twitter") [ ](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fphishprotection.com%2Fblog%2Fhow-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you%2F "Share on Facebook") [ ](https://reddit.com/submit?url=https%3A%2F%2Fphishprotection.com%2Fblog%2Fhow-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you%2F&title=How%20Something%20Meant%20to%20Protect%20Your%20Mobile%20Device%20is%20Being%20Used%20to%20Phish%20You "Share on Reddit") [ ](mailto:?subject=How%20Something%20Meant%20to%20Protect%20Your%20Mobile%20Device%20is%20Being%20Used%20to%20Phish%20You&body=Check out this article: https%3A%2F%2Fphishprotection.com%2Fblog%2Fhow-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you%2F "Share via Email") 

![Phish Protection blog post image](https://media.mailhop.org/phishprotection/images/2020/02/what-is-phishing-9431.jpg) 

Since mobile devices are essentially computers, _it didn’t take long to figure out they needed to be protected like computers_. That’s especially true given how frequently users download apps from the app store onto their mobile devices.

One example of mobile protection is [Google Play Protect](https://www.android.com/play-protect/). _Google Play Protect is Google’s built-in malware protection for Android devices_. When you download an app from the Google Playstore, Google Play Protect automatically scans your device and makes sure your apps and everything else are safe. Sounds pretty good.

Users place a lot of trust in Google Play Protect, and unfortunately, that trust is being used against you to get you to lower your defenses to a phishing attack. According to a recent article on [Bleeping Computer](https://www.bleepingcomputer.com/news/security/phishing-attack-disables-google-play-protect-drops-anubis-trojan/), “Android users are targeted in a phishing campaign that will infect their devices with the **Anubis banking Trojan** that can steal financial information from more than 250 banking and shopping applications. The campaign uses a devious method to get the potential victims to install the malware on their devices: it asks them to enable Google Play Protect while actually disabling it after being granted permissions on the device.”

Did you catch that? Google Play Protect is enabled by default. So, _when the hackers ask you if you want to enable it, they are actually disabling it_, which means you’re no longer protected. Somewhere in every successful **phishing attack**, the victim has to be tricked into cooperating with the hacker.

![What is phishing](https://media.mailhop.org/phishprotection/images/2020/02/what-is-phishing-9431.jpg) 

Continuing from the article, “once the Android smartphone or tablet is compromised, Anubis will start harvesting a list of installed applications to compare the results against a list of targeted applications. Once an application has been identified, _Anubis overlays the original application with a fake login page to capture the user’s credentials_.” You almost don’t have a chance. Almost.

Sophisticated attacks like these, especially against mobile devices, are why you need email security like that available from [Phish Protection](/). Phish Protection is cloud based. Why is that important? _It’s important because it means all your emails are first sent to Phish Protection to be scanned for malicious content before they ever reach your inbox_. And it also means it protects ALL of your devices, including all of your mobile devices.

_Phish Protection requires no hardware, no software and no maintenance. It sets up in 10 minutes and works with all email services_. Try it risk free for 30 days and you won’t have to worry about how clever hackers are.

## Topics

[ Phishing ](/tags/phishing/) 

![Brad Slavin](https://media.mailhop.org/phishprotection/images/authors/brad-slavin.jpg) 

[ Brad Slavin ](/authors/brad-slavin/) 

General Manager

Founder and General Manager of DuoCircle. Product strategy and commercial lead across DuoCircle's 2,000+ customer base.

[LinkedIn Profile →](https://www.linkedin.com/in/bradslavin) 

## Protect your inbox from phishing attacks

Real-time email security with 60-day free trial. No credit card required.

[Start Free Trial](https://portal.duocircle.com/cart.php?a=add&pid=101&brand=phishprotection) [View Pricing](/pricing/) 

## Related Articles

[  Foundational 5m  0ktapus, Okta Breach Helps Attackers Launch Sophisticated Supply Chain Attacks  Sep 5, 2022 ](/blog/0ktapus-okta-breach-helps-attackers-launch-sophisticated-supply-chain-attacks/)[  Foundational 4m  13 Spear Phishing Attacks Examples To Justify Investment For Phishing Prevention Solutions In Your Organization  Aug 1, 2019 ](/blog/13-spear-phishing-attacks-examples-to-justify-investment-for-phishing-prevention-solutions-in-your-organization/)[  Foundational 4m  All 14 centers of Kettering Health were affected by a massive ransomware attack, Major outage in the Ohio medical center  May 23, 2025 ](/blog/14-centers-of-kettering-health-were-affected-by-massive-ransomware-attack-in-ohio-medical-center/)[  Foundational 4m  2021 Phishing Trends You Need To Be Wary Of  Aug 2, 2021 ](/blog/2021-phishing-trends-to-be-wary-of/)

```json
{"@context":"https://schema.org","@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]}
```

```json
{"@context":"https://schema.org","@type":"WebSite","name":"Phish Protection","url":"https://phishprotection.com","description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]}}}
```

```json
{"@context":"https://schema.org","@type":"BlogPosting","headline":"How Something Meant to Protect Your Mobile Device is Being Used to Phish You","description":"Since mobile devices are essentially computers, it didn’t take long to figure out they needed to be protected like computers.","url":"https://phishprotection.com/blog/how-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you/","datePublished":"2020-02-13T07:09:11.000Z","dateModified":"2026-04-17T15:43:10.000Z","dateCreated":"2020-02-13T07:09:11.000Z","author":{"@type":"Person","@id":"https://phishprotection.com/authors/brad-slavin/#person","name":"Brad Slavin","url":"https://phishprotection.com/authors/brad-slavin/","jobTitle":"General Manager","description":"Brad Slavin is the founder and General Manager of DuoCircle, the company behind DMARC Report, AutoSPF, Phish Protection, and Mailhop. He founded DuoCircle in 2014 and has led the company's growth to 2,000+ customers across its email security product family. Brad's focus is product strategy, customer relationships, and the commercial and compliance side of email authentication (DPAs, SLAs, enterprise procurement).","image":"https://media.mailhop.org/phishprotection/images/authors/brad-slavin.jpg","knowsAbout":["Email Security Strategy","SaaS Product Management","Enterprise Compliance","Customer Success","Email Deliverability Business"],"worksFor":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com"},"sameAs":["https://www.linkedin.com/in/bradslavin"]},"publisher":{"@type":"Organization","name":"Phish Protection","url":"https://phishprotection.com","logo":{"@type":"ImageObject","url":"https://phishprotection.com/images/phishprotection-logo.png"},"description":"Advanced phishing protection and email security for businesses. Real-time threat defense, time-of-click protection, and seamless Office 365 integration.","parentOrganization":{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138883901","name":"DuoCircle LLC","url":"https://www.duocircle.com","sameAs":["https://www.wikidata.org/wiki/Q138883901","https://www.crunchbase.com/organization/duocircle-llc","https://www.linkedin.com/company/duocircle","https://github.com/duocircle"],"subOrganization":[{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138898167","name":"DMARC Report","url":"https://dmarcreport.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897474","name":"AutoSPF","url":"https://autospf.com"},{"@type":"Organization","@id":"https://www.wikidata.org/wiki/Q138897912","name":"Phish Protection","url":"https://www.phishprotection.com"}]},"sameAs":["https://www.linkedin.com/company/duocircle","https://x.com/duocirclellc","https://www.facebook.com/duocirclellc","https://github.com/duocircle"],"contactPoint":{"@type":"ContactPoint","contactType":"customer support","url":"https://phishprotection.com/contact/"},"knowsAbout":["Phishing Protection","Email Security","Anti-Phishing","Business Email Compromise","Ransomware Protection","Time of Click Protection","Office 365 Email Security","Advanced Threat Defense"]},"mainEntityOfPage":{"@type":"WebPage","@id":"https://phishprotection.com/blog/how-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you/"},"articleSection":"foundational","keywords":"Phishing","wordCount":419,"image":{"@type":"ImageObject","url":"https://media.mailhop.org/phishprotection/images/2020/02/what-is-phishing-9431.jpg","caption":"Phish Protection blog post image","width":1200,"height":630},"speakable":{"@type":"SpeakableSpecification","cssSelector":[".answer-block","h1"]}}
```

```json
{"@context":"https://schema.org","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://phishprotection.com/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https://phishprotection.com/blog/"},{"@type":"ListItem","position":3,"name":"Foundational","item":"https://phishprotection.com/foundational/"},{"@type":"ListItem","position":4,"name":"How Something Meant to Protect Your Mobile Device is Being Used to Phish You","item":"https://phishprotection.com/blog/how-something-meant-to-protect-your-mobile-device-is-being-used-to-phish-you/"}]}
```
