There's a category of hackers out there that you need to watch out for, and these are people that create fake apps including VPN’s, ad-blockers, RAM cleaners, and even online dating services. 

sam thomas
sam thomas
loading...

According to msn.com,
‘Thought to be active since 2015, VexTrio is a complex criminal enterprise that involves several companies and employs traffic distribution systems (TDSs) to spread malware and other online scams.’ 

Yes, you thought your App Store was safe but it's not. VexTrio is responsible for releasing apps under developer names like LocoMind, HolaCode, AlphaScale Media, Hugmi, and Klover Group To name just a few, and these apps are not benign. 

Hackers
Hackers
loading...

Once you sign up for one of these apps you're immediately bombarded with seemingly unceasing ads and asked to sign up for what are described as deceptive subscriptions. One fake developer, LocoMind In 2024 was responsible for over 500,000 downloads Of malicious apps. 

VexTrio Enterprises is responsible for Nearly 100 Companies with malicious intent, large scale spamming enterprises, and Malicious apps, working hand in hand with hackers. 

Hackers
Hackers
loading...

Among the hacker community, VexTrio is probably best known for Their TDS or traffic distribution system which was Co-developed in Eastern Bloc countries and Italy. Their TDS system is designed to help disguise digital fraud. 

Infoblox Threat Intel has a team that's been studying VexTrio since 2022, publishing multiple reports over the years reporting their illegal activities in 2024 and 2025.  

Hackers
Hackers
loading...

The thing to remember is that just because it's in an App Store doesn't mean that it's not spurious. Don't let yourself be lured in with a free app. Make sure that it's from a reputable company that you recognize.
This fake VPN could have been spying on you all this time
VexTrio Unveiled: Inside the Notorious Scam Enterprise
Fake VPN and Spam Blocker Apps Tied to VexTrio Used in Ad Fraud, Subscription Scams

5 Ways To Protect Yourself From Hackers

The FBI is warning about Chinese hackers targeting Idaho's infrastructure. Here's what you can do to protect your personal information from being affected...

Gallery Credit: Chris Cardenas


12 Shrewd Email Tactics Hackers Use To Rip You Off

Computer hackers are working full-time nowadays --not only to hold major corporations hostage with ransomware -but they're also hard at work trying to gain access to private computers and personal information of unsuspecting victims. Surrendering access to these schemers could have disastrous consequences, but sometimes it can be difficult to tell what's legitimate and what's not. That's why I'm sharing 12 emails I've personally received that appear to be as bogus as a three-dollar bill.

No doubt, you have received very similar emails in your inbox and wondered if they were legit. A good rule of thumb to follow is when you receive an email from an unverified source - do not, under any circumstance click on anything in the email or download any attachments. That is exactly how hackers can gain instant access to your computer and your information.

Gallery Credit: Zane Mathews


 

More From The Quake 102.1