Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Microsoft Data Backup Communication Small Business Mobile Device Smartphones Saving Money Workplace Strategy Business Management communications Android Mobile Devices VoIP Smartphone Managed IT Services Microsoft Office Data Recovery Browser Managed Service Passwords Upgrade Social Media Disaster Recovery Backup Network Tech Term Internet of Things Artificial Intelligence Automation Covid-19 Cloud Computing Remote Server Managed Service Provider Remote Work Windows Facebook Miscellaneous Outsourced IT Encryption Gadgets Spam Information Employee/Employer Relationship Holiday Windows 10 Business Continuity Data Management Government Windows 10 Blockchain Wi-Fi Productivity Business Technology Bandwidth Compliance Data Security Current Events Virtualization Apps Two-factor Authentication Managed Services Voice over Internet Protocol Office Chrome Budget Mobile Device Management Networking Apple Gmail App Vendor Employer-Employee Relationship Office 365 Hacker Conferencing Avoiding Downtime Mobile Office How To BDR Applications Computing Information Technology Access Control Computers Analytics Office Tips Healthcare Augmented Reality Retail Website Marketing Storage Password Bring Your Own Device Managed IT Services AI HIPAA WiFi Router Big Data BYOD Operating System Virtual Private Network Training Risk Management Health Help Desk Tip of the week Remote Workers Document Management IT Support Telephone Free Resource Scam Data loss Project Management Windows 7 Cooperation Firewall Microsoft 365 Solutions Patch Management Save Money Remote Monitoring The Internet of Things Going Green End of Support Vulnerability Vendor Management Social Windows 11 Cybercrime Display Printer Excel Monitoring Paperless Office Infrastructure Customer Service Presentation Saving Time Machine Learning Outlook Managed IT Service Wireless Technology iPhone Money Humor Downloads Maintenance Data Privacy Vulnerabilities Antivirus Licensing Word Sports Entertainment Mouse Images 101 Mobility Multi-Factor Authentication Administration Telephone System Cost Management Robot Safety Employees Integration Settings Wireless IT Management Printing Content Filtering VPN Meetings User Tip Modem Mobile Security YouTube Processor Holidays 2FA Supply Chain Cryptocurrency Computer Repair Data Storage Customer Relationship Management Video Conferencing Smart Technology Managed Services Provider Professional Services Virtual Desktop Virtual Machines LiFi Data storage Hacking Distributed Denial of Service Windows 8 Electronic Medical Records Regulations Compliance Technology Care Laptop SharePoint Screen Reader Evernote Memes Business Communications Service Level Agreement Computing Infrastructure Drones User Writing Net Neutrality Scams SQL Server Lenovo Identity Smart Tech Virtual Reality Financial Data Hybrid Work Halloween Bookmark History IT Human Resources Download Server Management Alerts IP Address Private Cloud Smartwatch Identity Theft Procurement Cables Azure Superfish Connectivity Tech Break Fix Hacks Twitter Telework Scary Stories Browsers Cyber security Communitications Google Apps Fun Upload Error Recovery CES Multi-Factor Security Hard Drives Deep Learning Social Engineering Supply Chain Management IT Maintenance Social Network IoT Term Dark Web Domains Remote Computing FinTech Business Intelligence Education IT Assessment Shortcuts Trends Tablet Google Calendar Refrigeration Flexibility Ransmoware Customer Resource management Value Regulations Star Wars Microsoft Excel Public Speaking Mobile Computing Alert Organization Vendors Data Analysis Dark Data Smart Devices Be Proactive Search Gamification Managed IT Staff Lithium-ion battery File Sharing Digital Security Cameras Legislation Best Practice How To Entrepreneur Remote Working Workforce Memory Social Networking Google Play Notifications Threats Buisness Fileless Malware Data Breach IT solutions Electronic Health Records Workplace Strategies Content Wearable Technology Legal Travel Videos Google Maps Comparison Undo Business Growth Meta Health IT Wasting Time Techology Motherboard Assessment Security Cameras Permissions Amazon Directions Trend Micro Software as a Service Cortana Unified Threat Management Specifications Alt Codes Outsource IT Managing Costs Unified Threat Management Internet Exlporer SSID Fraud Environment Downtime Microchip eCommerce Media Hosted Solution Network Congestion Surveillance Username Virtual Assistant Application Black Friday Typing Physical Security Small Businesses Virtual Machine User Error Database Medical IT IBM Reviews Displays Development Knowledge Transportation IT Technicians Google Drive Point of Sale Cyber Monday Outsourcing Proxy Server Hypervisor Cookies 5G Tactics PowerPoint Network Management Hotspot Tech Support Shopping Optimization Unified Communications Monitors Workplace Experience Employer/Employee Relationships Mirgation Google Docs Competition Bitcoin PCI DSS Hiring/Firing Running Cable Nanotechnology Navigation Addiction Language Google Wallet Websites Gig Economy Paperless Internet Service Provider Co-managed IT Management Teamwork Chatbots

Blog Archive