ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Data Backup Ransomware Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Passwords Holiday Disaster Recovery Covid-19 Apps IT Support Browser Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Remote Work Internet of Things Managed Service Provider Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Workplace Strategy Networking Windows Gadgets Remote Business Technology Bandwidth Blockchain WiFi Encryption Server Mobile Device Management App Virtualization Information Spam Employee/Employer Relationship Budget Gmail Office Two-factor Authentication Apple Office 365 History Information Technology Analytics Cybercrime Wi-Fi Access Control Conferencing Big Data Data Security BDR Health Document Management IT Management Save Money Remote Computing Training Compliance Voice over Internet Protocol Help Desk Patch Management Hacking Cost Management Vendor Remote Monitoring Employer-Employee Relationship Hacker Alert Customer Service Data storage Unified Threat Management Firewall Hiring/Firing Outlook Augmented Reality Password Word Data loss IBM Website Mobile Office BYOD Computing Managed Services Vendor Management Hard Drive Search... Project Management Applications Best Practice Legal Retail Money Vulnerabilities Monitoring Mobility Meetings Sports Social Healthcare SaaS DDoS User Google Maps Scam Travel Virtual Reality iPhone Social Engineering Education Cryptocurrency Cortana Black Market Content Filtering Chrome VPN Cleaning Robot Update Remote Workers Router Windows 11 Windows 7 Free Resource Mobile Computing The Internet of Things YouTube Marketing Paperless Office How To Antivirus Data Breach Running Cable Maintenance Laptop Twitter Storage Law Enforcement End of Support Printer Websites Vulnerability Virtual Desktop Multi-factor Authentication Avoiding Downtime Hack Identity Theft Experience Holidays Notifications Software as a Service HIPAA Data Protection Unified Communications Saving Time Cooperation Google Docs Bluetooth Video Conferencing Distributed Denial of Service Computers Disaster Bitcoin Virtual Machines Office Tips Private Cloud Memory Telephone Computer Repair Lithium-ion battery Professional Services Tech Terms Excel Managed IT Politics Machine Learning Settings PowerPoint Digital Processors Managed Services Provider Administration Solid State Drive Presentation Taxes Virtual Private Network Virtual Assistant Specifications IT Consultant Current Events Chromebook Drones Customer Relationship Management Solutions Automobile Co-Managed IT Physical Security Wireless Technology eWaste Processor Entertainment Images 101 Integration Display How To Downtime Microchip Start Menu Safety Flexibility Downloads Computer Care Employees Writing Uninterrupted Power Supply Videos Webcam Surveillance Reliable Computing Managing Costs Proxy Server Troubleshooting Shortcuts Business Mangement Emails Fake News Tablets Computing Infrastructure SSID Service Level Agreement Management Device security Media Development Employer/Employee Relationships Scalability Virtual Machine Administrator Google Calendar Text Messaging Be Proactive Proactive IT Wireless Headphones Supercomputer Staffing Microsoft Excel Business Cards Reviews IP Address Optimization Bring Your Own Device Tech Virus Going Green Error 2FA Motion Sickness Teamwork Hypervisor Comparison Bookmark Business Owner Workplace Strategies Google Drive Music Data Storage Download Piracy Shopping Medical IT Term Knowledge Corporate Profile HTML Paperless SQL Server PCI DSS Competition Licensing Botnet Television Browsers Telephony Nanotechnology Employer Employee Relationship Recovery Micrsooft Upload Cabling Software License Gig Economy Humor Rental Service Google Play Azure Flash Social Network Tablet LiFi Business Communications G Suite Internet Service Provider Entrepreneur Regulations Compliance Application Managed IT Service Mouse Telephone Systems Data Analysis Inbound Marketing Smart Technology VoIP Business Growth Screen Reader Tracking Documents Trends Mobile Technology Memes Business Intelligence Security Cameras Customer Resource management Devices Human Resources Web Server Net Neutrality Digital Payment Securty Tip of the week Financial Data SharePoint Banking Fileless Malware Google Wallet Deep Learning Gamification Worker Company Culture Risk Management Domains IT Messenger Electronic Payment Telephone System Access Regulations Google Apps Public Cloud Telework Business Metrics Directions Supply Chain Time Management Hosted Solution Backup and Disaster Recovery Content Phone System Desktop Smartwatch Communitications Microsoft 365 Books Audit Language Electronic Medical Records Spyware Society Accountants Procurement File Sharing FinTech Public Speaking Workplace Database Redundancy Monitors Streaming Media Visible Light Communication CES IT Assessment Reading Keyboard Value Health IT Cache Windows 8 Equifax Supply Chain Management Workers Hard Drive Disposal Organization Hard Drives Cyber security Scams Unified Threat Management Tactics Computer Accessories Displays Username Advertising Smart Devices intranet Relocation Shortcut Printing Work/Life Balance Tech Support Startup CCTV Wireless Freedom of Information Remote Working email scam AI Heating/Cooling Trend Micro Environment Navigation Cables Touchscreen Addiction Emergency Windows XP Mobile Security Digital Security Cameras Computer Malfunction Electronic Health Records Social Networking Transportation Wasting Time In Internet of Things User Tip Vendor Mangement Legislation News Samsung eCommerce Modem Hacks Evernote Point of Sale Network Congestion Network Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?