Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Prosper IT
  • Register

Prosper Solutions Blog

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Prosper Solutions at (617) 369-9977.

A Hosted VoIP System Comes with Real Benefits
Phishing Attacks and How to Thwart Them
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, March 25, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Trending Telephone Machine Learning Start Menu A.I. Redundancy Google Wallet Business Continuity Running Cable Licensing Displays Printers Mobile Security IT Services Television Emails Supercomputer Keyboard Password Robot Software Web Server Software License Multi-Factor Security Education Vendor Management Innovation Communication Monitors Competition Networking Hosted Solutions IT Management Outlook Motion Sickness Desktop Managed IT Services eWaste Shortcut Relocation Upgrades Black Market Statistics Windows 7 PowerPoint Unified Threat Management Phone System Distribution Skype Cache Domains Deep Learning Virus Social Retail Computer Malfunction Compliance Laptop Physical Security Windows 10 Legal Hacking Websites Vulnerability Save Time Uninterrupted Power Supply Private Cloud Website User Tip Telephony Identity Theft Technology Tips Data Analysis Training Digital Payment Downloads Specifications Business Technology Corporate Profile Equifax Customer Service Law Enforcement Intranet Microsoft 365 History Processors IBM USB Vulnerabilities Google Play Computing Meetings Reading GDPR Banking Virtual Reality Automation Mobility Managing Stress iPhone Customer Resource management Botnet Printing Worker Tip of the week Wireless Headphones Office Tips Google Drive Books Productivity How To Tablets Solutions cloud Enterprise Resource Planning Logistics IT Support Lithium-ion battery Facebook Healthcare Disaster Proactive IT VoIP Risk Management Webcam Save Money Data storage Inbound Marketing Workers Database Hard Drive Fileless Malware Capital Electronic Medical Records Windows 8 In Internet of Things Windows10 Cabling Two-factor Authentication Firewall Staffing Internet Net Neutrality Privacy Read Maintenance Error Cryptocurrency Spam Telephone System Society Migration Hiring/Firing Proxy Server Fake News Unified Threat Management End of Support Sync Update Mobile Device Management Network Technology Marketing Public Speaking outsource cloud computing Memory Computers Bitcoin Printer Data Backup Twitter Virtualization IT Support Business Intelligence Business Mangement Modem Business Metrics Employer Employee Relationship Big data Augmented Reality Chamber Music Social Engineering Fleet Tracking Settings cloud storage Professional Services Navigation MSP News Virtual Assistant Holiday Data Security Phishing Mouse Digital Signature Users Messenger SSID Analytics Apple outsource cloud storage Cybersecurity SharePoint Asset Tracking the Internet of Things Document Management Email Disaster Recovery Blockchain Cooperation Product Reviews Co-Managed IT Money IT switches Router Security Excel Emergency BYOD Medical IT Electronic Payment Conferencing Business Computing Vendor Mangement Antivirus communications Hacks Hacker Tablet Hard Drive Disposal Collaboration Regulations Google Maps Windows XP Scalability Best Practice Notifications Rapid City Wireless Social Network SaaS WannaCry Efficiency Budget Apps Microsoft Office Mobile Payment Backup and Disaster Recovery Search Content Tactics Regulation uptime Microchip Automobile Entertainment Consultation Flexibility Microsoft Excel Taxes Small Business Workplace Tips Environment Health Public Cloud Knowledge Bluetooth Bandwidth Avoiding Downtime Computer Accessories Administrator VPN Documents Programming Mobile Technology Computer Repair Server Safety Windows Server 2008 Patch Management Wireless Technology Gadgets BDR Customer Relationship Management Information Technology Data Warehousing Tracking Computer Care Network Congestion Managed IT services Integration Patching Microsoft Windows 10 Ransomware Assessment Voice over Internet Protocol Computing Infrastructure Touchscreen Cost Management Presentation Smartphone Cleaning Tip of the Week Experience Streaming Media Sports Startup Social Networking Quick Tips Nanotechnology 3D Printing Malware Google Calendar IT consulting Internet of Things Alert Security Cameras Dark Web Productuvuty clout services Remote Monitoring Drones Distributed Denial of Service Help Desk Gaming Console Connected Devices Pain Points Data Loss Rental Service Time Management User Error Processor VoIP HIPAA Cybercrime Samsung Business Cards Spyware Smart Tech Windows Audit Piracy Computer Productivity Username Chromebook PDF Writing Devices hardware Content Filtering Government Best Practices Advertising Management Permissions IT Consultant Mobile Devices Freedom of Information Hosted Solution Business Owner Visible Light Communication Bata Backup CrashOverride Travel Data Monitoring Browser Teamwork Word User Finance Mobile Device Outsourced IT IP Address Addiction Encryption Network Security LiFi CIO Bring Your Own Device Chrome Congratulations Device security Citrix Xenapp Mobile Computing Downtime Business Comparison Access Hard Drives Software as a Service Term Network Management Analytic Application Language Data Breach Best Available Screen Reader UTM Android Passwords Smartphones Reliable Computing Hackers Fiber-Optic Browsers YouTube CCTV Vendor Remote Computing Tech Terms Business Management Managed IT Gmail Hack File Sharing Upload Employer-Employee Relationship WiFi Unified Communications Artificial Intelligence Evernote Office 365 Value Accountants Tech Term Thank You Flash Solid State Drive Project Management App Directions Electricity Social Media Storage Cost Securty HTML Google Docs Troubleshooting User Tips Virtual Desktop Service Level Agreement Information G Suite DDoS Gamification Human Resources Office Scam Company Culture Trends Going Green Access Control Paperless Office Upgrade Health IT Micrsooft IT service Tech Backup Multi-factor Authentication Managed Service Wi-Fi Work/Life Balance cloud computing Recovery Saving Time Managed IT Service Managed Service Provider IT Plan Saving Money Text Messaging Operating System Google Current Events email scam Data Management Data Recovery Bookmark Fraud Processing Download Administration Data Protection Digital Telephone Systems Entrepreneur Miscellaneous Politics Applications cyber security Tech Support Heating/Cooling Legislation Business Growth Cortana

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150