About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Prosper Solutions at (617) 369-9977.

A Hosted VoIP System Comes with Real Benefits
Phishing Attacks and How to Thwart Them


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Virtual Assistant Current Events Small Business Information Visible Light Communication Knowledge IT Support Reliable Computing Rapid City Consultation Asset Tracking Notifications Wi-Fi Addiction Gmail Unified Communications Google Docs Scam Operating System Printers Start Menu Windows 10 Workers DDoS Professional Services Business Cards User Error Data Loss Public Cloud Browsers Administration Business Computing Project Management WiFi Maintenance Social Media Windows 10 Microsoft 365 VPN Unified Threat Management Smartphone Training Money Collaboration Hard Drive Disposal Server Tech Terms Ransomware hardware Network Management IT Management Vendor Mangement Rental Service Directions Malware Proactive IT Chamber Tech Support Cost Management Politics Word Virtual Desktop Trends Writing Dark Web Employer-Employee Relationship Supercomputer Webcam Best Available Content Printing Tip of the Week Saving Money Solid State Drive G Suite Cleaning Environment Google Play Television VoIP Domains Compliance Data Security Quick Tips Security Cameras Remote Monitoring Telephone Systems Displays User Tip Downloads Data Breach Digital Signature Documents switches Efficiency VoIP Customer Relationship Management Outlook Data Backup Assessment Apple PowerPoint Backup Software as a Service Data Recovery Medical IT Mobile Computing Multi-Factor Security Android IT Support Hiring/Firing Mobile Payment Microsoft Excel File Sharing Hacks Bookmark Saving Time Application Settings Managed IT Service Save Money Running Cable PDF Microchip Comparison Avoiding Downtime Risk Management Computer Repair Patching Business Owner Scalability MSP Downtime Modem Value Cybersecurity Deep Learning Capital Network Congestion Employer Employee Relationship Social Competition Phishing the Internet of Things Managing Stress Enterprise Resource Planning Bandwidth Robot Content Filtering Automation Monitors Teamwork Outsourced IT Memory Disaster Recovery Logistics Network Security Mobile Security eWaste Windows 8 Society Service Level Agreement Privacy Business Mangement Mobile Technology Websites Bring Your Own Device Data Protection Read Identity Theft Term Data Analysis Information Technology Redundancy Two-factor Authentication Windows10 Chrome Google CCTV Unified Threat Management Office 365 Human Resources Congratulations End of Support Save Time Work/Life Balance Tablets Health IT outsource cloud computing Computing Telephone System GDPR Inbound Marketing Office Gadgets Electricity Storage Hosted Solution IT service Facebook outsource cloud storage BDR LiFi Cost Phone System Specifications Voice over Internet Protocol Upgrades A.I. IP Address Passwords Processing Travel Digital Recovery Public Speaking Keyboard Monitoring Artificial Intelligence SSID Computers Wireless Headphones Gamification Trending Reading Productuvuty Education Digital Payment Smart Tech Social Engineering Augmented Reality Upload Update Lithium-ion battery Devices Customer Service HIPAA Chromebook Safety Business Technology Document Management Hard Drive Holiday Managed Service Provider Bata Backup Processor History Users SaaS Skype Cabling Security Access Securty Electronic Payment Miscellaneous Screen Reader Evernote Innovation Managed IT Services Computing Infrastructure Excel Migration Machine Learning Multi-factor Authentication Navigation YouTube Download Error Computer Care Regulations Router IT Regulation Device security Flash Upgrade Hacker WannaCry Company Culture Startup IT consulting Spam Legal Spyware Username Experience Licensing Apps Entrepreneur email scam Productivity Windows XP communications Computer Malfunction cyber security Going Green Mobile Device Management Windows Server 2008 Product Reviews Gaming Console Laptop Administrator Worker Managed IT Government Cooperation Vendor Time Management Windows Social Network Statistics Business Growth Cybercrime Electronic Medical Records Banking Best Practice Presentation Solutions User Website Troubleshooting App Microsoft Shortcut Communication Pain Points Telephony Workplace Tips Disaster Google Drive Motion Sickness Virtualization Vulnerabilities Net Neutrality Citrix Xenapp Microsoft Office Access Control Conferencing Smartphones Web Server Analytics cloud computing Backup and Disaster Recovery Analytic Hack Private Cloud Customer Resource management Distributed Denial of Service Google Calendar Office Tips cloud storage Patch Management Mouse Thank You Heating/Cooling Search Vendor Management Proxy Server Best Practices Database Tactics Help Desk Antivirus Botnet Data Managed IT services IT Consultant Business Metrics Taxes Healthcare Hacking IT Services Bluetooth Programming Marketing Networking Windows 7 Computer Accessories Wireless Printer Hosted Solutions Email Fileless Malware Tablet Music Advertising Google Wallet Virus Technology Integration HTML 3D Printing cloud Connected Devices Accountants UTM Business Management Emails Automobile Data Warehousing Internet Tech Term Social Networking Paperless Office Messenger Intranet Hackers Network Retail Permissions Business Continuity Wireless Technology clout services Big data Productivity Fleet Tracking Text Messaging Applications Black Market Mobile Devices Budget Managed Service Corporate Profile Health Flexibility CrashOverride Data storage Distribution Cache Software Relocation Data Management Management Tracking Remote Computing Uninterrupted Power Supply BYOD Mobile Device USB Browser IT Plan Language uptime iPhone SharePoint Business Computer Tip of the week Samsung Staffing Sports Mobility Software License Google Maps CIO Telephone How To Emergency Physical Security Internet of Things Vulnerability Law Enforcement Sync User Tips Virtual Reality Audit Twitter Nanotechnology Hard Drives Touchscreen Micrsooft Drones Piracy Blockchain Finance Books Fiber-Optic Processors Cortana Fraud Tech Cryptocurrency Freedom of Information Alert News Entertainment Streaming Media Desktop Equifax Password IBM In Internet of Things Meetings Co-Managed IT Technology Tips Fake News Legislation Business Intelligence Encryption Bitcoin Firewall

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150