Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 04 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Quick Tips Passwords Backup Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Business Management Smartphones AI Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Mobile Device Management Chrome Tip of the week Budget Gmail Managed Services Voice over Internet Protocol WiFi How To BDR Computing HIPAA Information Technology Hacker Applications Avoiding Downtime Office 365 Marketing Access Control Conferencing Managed IT Services Big Data Operating System Router Computers Risk Management Virtual Private Network Website Health Analytics Office Tips 2FA Help Desk Augmented Reality Storage Retail Password Bring Your Own Device Healthcare Scam The Internet of Things Data loss Cooperation Free Resource Social Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability Cybercrime End of Support Vendor Management Solutions Customer Service Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone iPhone Administration Licensing Vulnerabilities Entertainment Data Privacy Images 101 Telephone System Settings Multi-Factor Authentication Robot Mobility Wireless Printing Customer Relationship Management Cost Management Content Filtering YouTube IT Management Hacking Cryptocurrency VPN Employees Presentation Meetings Integration User Tip Wireless Technology Modem Computer Repair Mobile Security Processor Virtual Desktop LiFi Data storage Holidays Data Storage Outlook Word Smart Technology Supply Chain Video Conferencing Money Machine Learning Managed Services Provider Humor Professional Services Saving Time Virtual Machines Managed IT Service Sports Safety Maintenance Mouse Antivirus Downloads Social Engineering Break Fix Scams Mobile Computing Browsers Smartwatch Connectivity IT Upload Procurement Search Remote Computing Azure Hybrid Work Best Practice Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Buisness Tablet IoT Communitications IT solutions Trends Supply Chain Management Application Alert Legal Business Growth Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis IBM Star Wars IT Assessment Gamification Flexibility Cortana Notifications Staff Value Business Intelligence Alt Codes Organization Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Downtime Google Maps Smart Devices Hosted Solution Content Remote Working Wearable Technology Memory Vendors Typing Health IT Competition Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Knowledge Wasting Time Threats Google Drive Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies User 5G Fraud Meta User Error Microchip Internet Exlporer Software as a Service Unified Communications Username Experience Managing Costs Amazon Google Docs Bitcoin Running Cable Point of Sale eCommerce Black Friday SSID Virtual Assistant Outsource IT Google Wallet IP Address Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment Media Windows 8 Proxy Server Reviews Laptop Cookies Monitors Cyber Monday Medical IT Recovery Hotspot Transportation Small Businesses Drones Tactics Development Hard Drives Websites Mirgation Hypervisor Displays Shopping Domains Halloween Nanotechnology Optimization PowerPoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Refrigeration Chatbots Navigation Writing Distributed Denial of Service Workplace Hacks Lenovo Gig Economy Public Speaking Scary Stories Screen Reader Service Level Agreement Internet Service Provider Fun Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Deep Learning Server Management Regulations Compliance Private Cloud Identity Entrepreneur Evernote Paperless Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Education Download Net Neutrality Twitter Alerts SQL Server Technology Care Financial Data Undo Error History Business Communications

Blog Archive