facebook linkedin twitter

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Computerware at (703) 821-8200.

A Hosted VoIP System Comes with Real Benefits
Phishing Attacks and How to Thwart Them
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Network Security Saving Money Malware Email Hosted Solutions IT Services Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices User Tips Smartphones Gadgets Innovation Business Continuity Disaster Recovery Android Social Media Microsoft Office Mobile Office Virtualization Network VoIP Data Backup Server Mobile Device Management Collaboration Communication Smartphone Data Recovery Productivity Miscellaneous Windows 10 Tech Term Upgrade Ransomware Unified Threat Management Windows IT Support Operating System Facebook Holiday communications Remote Monitoring Passwords BYOD Apps Remote Computing Managed IT services Cybersecurity Mobile Computing Vendor Management Users Phishing WiFi BDR Marketing Mobile Device Analytics Automation The Internet of Things Firewall Outsourced IT Apple History Save Money Internet of Things Alert Data Management Artificial Intelligence Managed IT Services Browser App Encryption Big data IT Consultant Content Filtering Bandwidth Maintenance Office Printer Going Green Health Bring Your Own Device Gmail Antivirus Spam Cybercrime Hard Drives Windows 8 Outlook Saving Time Business Technology Cost Management Lithium-ion Battery Best Practice Information Technology Managed IT Tech Support Office 365 Virus Budget Windows 10 Two-factor Authentication Help Desk Wireless Technology Cloud Computing Search Hiring/Firing Access Control Employer-Employee Relationship Computers Hacking VPN Blockchain Travel Training IBM Update Phone System Money Document Management Recovery Healthcare Running Cable SaaS Proactive IT It Management Law Enforcement Applications Twitter Humor Intranet Compliance Education Managed Service Data storage Risk Management Hard Drive Customer Service Mobility Networking Save Time Legal Administration Information Website Regulations Government Sports Company Culture Disaster Avoiding Downtime Computer Repair Computing Word Social Networking Fax Server End of Support Hosted Solution Robot Data Security Password Cortana Value iPhone Securty Machine Learning Hacker Telephone Systems Patch Management Data Loss Solid State Drive Excel Scam Customer Relationship Management Flexibility Black Market File Sharing Data Breach Augmented Reality Cryptocurrency User Laptop PowerPoint Business Growth Project Management Business Intelligence Google Maps Digital Social Digital Payment Wireless Websites Social Engineering Current Events DDoS Router Downtime Comparison Tablet Paperless Office Uninterrupted Power Supply How To Unified Communications Settings Trending Retail Private Cloud Inbound Marketing Mouse Download Lifestyle eWaste Bitcoin Telephony Data Protection Programming Statistics Pain Points Network Congestion IT service Microchip Taxes Distributed Denial of Service Processors Conferencing Streaming Media Public Cloud Bluetooth USB Redundancy Presentation Identity Theft Google Docs Specifications Safety Gaming Console Monitoring Evernote Virtual Desktop Net Neutrality Chrome Experience Politics Vendor Monitors Documents Text Messaging Virtual Reality Cleaning Webcam Emails Office Tips Start Menu Tech Terms Entertainment Management Automobile Heating/Cooling Storage User Error Mobile Technology Computer Accessories Chromebook Co-managed IT YouTube Vulnerabilities Computing Infrastructure Hack Software as a Service Rental Service Meetings Micrsooft Navigation Google Drive Best Available Windows Server 2008 Keyboard Smart Phones Device security MSP LinkedIn Drones Vulnerability Domains Nanotechnology Social Network Data Analysis Cabling Spyware Mobile Payment Desktop Finance Web Server Leadership Startup Asset Tracking Skype Books Workers Electricity Printing Adminstration Pirating Information Business Cards Service Level Agreement Archive Wi-Fi Administrator GDPR Public Speaking Supercomputer Unified Threat Management Backup and Disaster Recovery Tech Permissions Language Windows 7 Shortcut Username Troubleshooting Screen Reader Customer Resource management Point of Contact Fileless Malware Worker Best Practives cache Television Entrepreneur Gamification HIPAA Smart Tech Distribution Reading Proxy Server Samsung switches Writing WannaCry Downloads Environment Piracy Upload Modem Music Electronic Medical Records Employer Employee Relationship Microserver Upgrades Corporate Profile Electronic Payment Fiber-Optic Database G Suite Term Time Management Freedom of Information Competition HTML Physical Security Business Owner Upselling Telephone System Analytic Directions Licensing LiFi Assessment SharePoint Mobile Security Recycling Hacks Tip of the week IP Address Multi-Factor Security Cost Product Reviews Relocation Dark Web Tablets Get More Done Google Calendar Video Surveillance Software License Trends Banking Botnet SSID Health IT Turn Key Deep Learning VoIP Human Resources Fraud Tactics Read Sync Processing Printer Server Work/Life Balance Touchscreen News Application Saving ZTime Devices Notifications CCTV Knowledge Managed IT Service Trojan Visible Light Communication Memory Consultation UTM Content Virtual Assistant Harddrive Legislation Error Reliable Computing Bookmark IT consulting Technology Tips Debate IT Plan Enterprise Resource Planning Device Management Business Metrics Computer Malfunction Organize Accountants A.I. Business Managemenet Audit GPS email scam Addiction Content Management In Internet of Things Google Play Digital Signature Fake News CIO Processor Advertising Flash Teamwork Data Warehousing External Harddrive Multi-factor Authentication Staffing Google Wallet Emergency Hard Drive Disposal Wireless Headphones Telephone Scalability Browsers Windows XP Access Migration Connected Devices online Currency Motion Sickness Thin CLient Equifax Fleet Tracking Messenger User Tip Tracking Displays Computer Care PDF 3D Ebay Network Management Security Cameras Webinar Society Microsoft Excel Printers Managing Stress CrashOverride Regulation 3D Printing Cooperation Capital Medical IT Productuvuty

toner1