Skip to main content

Google Removes 85 Adware Apps That Infect 9 Million Android Users

  

android adware
Google has removed 85 apps from its Play Store after finding out that they were pushing aggressive, full-screen adware to Android users.

With the rise in the mobile market, Adware has become one of the most prevalent mobile threats in the world. Adware has traditionally been used to aggressively push ads like banners or pop-ups on mobile screens to make money for its makers.

The now-removed 85 apps in question disguised as games, streaming TV, and remote control simulator apps in the Google Play store and had collectively been installed by nine million users all over the world.

Researchers from cyber security company Trend Micro spotted these apps which has the ability to bombard user devices with full-screen advertisements at regular intervals or when users unlock their device by monitoring their screen unlocking functionality.

The apps can display ads even when you are not browsing the internet, hide themselves and run in the background on infected devices.


The most popular fake app in the list was Easy Universal TV Remote, which was downloaded more than 5 million times before it was removed, had a solid 4-star rating from over 100,000 users with review section being populated with complaints from users.

Other apps included Police Chase Extreme City 3D Game, Prado Parking City 3D Game, Moto Racing, Parking Game, TV WORLD, SPORT TV, A/C Air Conditioner Remote, Garage Door Remote Control and many more.

Trend Micro researchers tested each app and discovered that though the apps came from different developers and had different APK cert public keys, most shared the same or similar code  The ads will show up uncontrollably, as at every move, tap or click, the fake apps eventually end up displaying an ad that generates money for their maker.

"Upon closing the first ad, call to action buttons such as 'start,' 'open app,' or 'next,' as well as a banner ad will appear on the mobile device’s screen. Tapping on the call to action button brings up another full-screen ad," the researchers said in a blog post.
"After the user exits the full-screen ad, more buttons that provide app-related options for users appear on the screen. It also prompts the user to give the app a five-star rating on Google Play. If the user clicks on any of the buttons, a full-screen ad will pop up again."
Even after a few seconds, the app disappears from the user's screen and hides its icon on the user's device, but still runs in the background. The hidden adware apps then show a full-screen ad every 15 or 30 minutes on the user's device.


Trend Micro researchers reported their findings to Google, who promptly removed them from its Play store after verifying the report. However, those users who have already installed one such app on their mobile handsets can remove it manually, but it's not as easy as it sounds."While the fake apps can be removed manually via the phone’s app uninstall feature, it can be difficult to get there when full-screen ads show up every 15 or 30 minutes or each time a user unlocks the device's screen," Trend Micro noted.While adware is becoming more aggressive a sophisticated these days, the risk is a bit higher on Android operating system than other platforms because of the extra permissions apps enjoy.Although Google has stepped up its efforts to remove potentially harmful apps from its Play Store in the past years and added more stringent malware checks for new apps, Adware app eventually finds its way into its mobile app marketplace to target millions of Android users.The easiest way to prevent yourself from falling victim to such attacks in the future is to always beware of fishy applications, even when downloading them from official Play Store and try to stick to the trusted brands only.Moreover, always look at the app reviews left by other users who have downloaded the app, and also verify app permissions before installing any app and grant only those permissions that are relevant for the app's purpose.Last but not the least, you are strongly advised to always keep a good antivirus app on your Android device that can detect and block such malicious activities before they can infect your device, and keep your device and apps up-to-date.



CEEH - (Certified Expert Ethical Hacker) Certification. This Is Advance Ethical Hacking Course You Will Learn In This Course
Chapter 1- Introduction Of Ethical Hacking
Chapter 2- Cyber Crime
Chapter 3- Foot-Printing
Chapter 4- Foot-Printing Pen-Testing
Chapter 5- Scanning
Chapter 6- Proxy Server
Chapter 7- Enumeration
Chapter 8- Banner Garbing
Chapter 9- Password Hacking
Chapter 10- Windows Hacking And Securing
Chapter 11- System Hacking
Chapter 12- Virus And Worm
Chapter 13- Physical Security
Chapter 14 - Ransomware
Chapter 15 -Sniffing
Chapter 16 -Social Engineering
Chapter 17 -Session Hijacking
Chapter 18 -Dos Attack
Chapter 19 -Stenography
Chapter 20 -Cryptography
Chapter 21 -Sql Injection
Chapter 22 -Web Server & Application Hacking
Chapter 23 -Buffer Overflow
Chapter 24 -Wireless Network Hacking
Chapter 26 -Sim Card Cloning
Chapter 27 -Android Hacking
Chapter 28 -Honey Port
Chapter 29 - Batch File Programing
And So On ...
Challenge EC-Council Course CEHv10 0r Update Version
.
Contact us:

Red Securium Pvt Limited Company

Red securium company provide best ethical hacking  and cyber security training in noida.

Address: Block A, A-25, Second Floor, Sector 3, Noida, Uttar Pradesh 201301
Telephone number: +91-120 429 1672
Email: info@redsecurium.org
Mobile number: +91-7455923827
Google+ Profile: Red Securium
Facebook profile: Red Securium
Twitter Profile: Red Securium

Instagram Profile: Red Securium

Comments

Popular posts from this blog

Tr0ll 1.0 – Vulnhub CTF Challenge Walkthrough

  Tr0ll 1.0 is an intentionally vulnerable machine, which is more of a   CTF  like type than real world scenario. Nevertheless, this machine has its own difficulties and you can learn some new stuff from it. So, let’s start. Enumeration Phase Let’s first run  netdiscover  to find the IP of our machine. netdiscover -r 192.168.1.1/24 After that, we run our typical  nmap  scan to see the open ports in the machine. nmap -A -sS -Pn -vv [target] Great we see many interesting stuff here. First of all, there is an open  FTP  port and we can connect to it with  anonymous access .  Also there is an open  http  port, we will run a nikto scan for it. The  ssh  port will be valuable later. From the nikto scan we got an interesting  /secret/  folder. When we get inside, we can understand why the machine got this name. Nothing interesting here, as you can see. we got trolled Let’s connect to the ftp server. When we get asked for the username we type ‘ anonymous ‘ and we l

Digital Marketing Services in noida

Red Securium Company Provide Digital Marketing Service In Noida Strengthen your brand positioning, awareness, revenue objectives and market share with our custom-built digital marketing services to suit their business needs. Get easily accessible to your target audience on mobiles and social networking sites across different platforms. Our cross-functional digital marketing experts offer end-to-end digital marketing solutions that are in step with your business's goals and policies. Our targeted digital marketing campaigns are custom-structured for helping you in strengthening your brand positioning, awareness, revenue objectives and market share. Digital Marketing Services  Digital Marketing Service  Social Network Marketing Service Seo Services Marketing  PPC Marketing Service  Social Media Marketing Sales Generation Services  Mobile Marketing Service  Content Marketing Service Event Marketing Service  Video Marketing Service Video Lo

Uber fined $1.1 million by UK and Dutch regulators over 2016 data breach

British and Dutch data protection regulators Tuesday hit the ride-sharing company Uber with a total fine of $1,170,892 (~ 1.1 million) for failing to protect its customers’ personal information during a 2016 cyber attack involving millions of users. Late last year, Uber unveiled that the company had suffered a  massive data breach  in October 2016, exposing names, email addresses and phone numbers of 57 million Uber riders and drivers along with driving license numbers of around 600,000 drivers. Besides this, it was also reported that instead of disclosing the breach at the time, the company  paid $100,000 in ransom  to the two hackers with access to the stolen data in exchange for keeping the incident secret and deleting the information. Today Britain’s Information Commissioner’s Office (ICO)  fined  Uber 385,000 pounds ($491,102), while the Dutch Data Protection Authority (Dutch DPA)  levied  a 600,000 euro ($679,790) penalty on Uber for failing to protect the personal informa