In an investigation, Eset again found many malicious Android apps that were listed on the Google Play Store for a long time and were very successful there as well. The 40 apps are said to have generated more than 8 million downloads. The creators ‘goal was to deliver adware to users’ devices to deal with plentiful criminals. […]
In an investigation, Eset again found many malicious Android apps that were listed on the Google Play Store for a long time and were very successful there as well. The 40 apps are said to have generated more than 8 million downloads. The creators ‘goal was to deliver adware to users’ devices to generate more crime-intensive ad money through full-screen ads. It is still a boring topic.
Each ad is displayed in full screen. If the Android user wants to check which application is responsible for the overlays, he can display the “Recently used applications”. There, however, another trick is used: a Facebook or Google icon is displayed for the adware application. The adware masquerades as the two legitimate applications to avoid suspicion and remain on the affected device for as long as possible.
Popular types of applications such as “Video Downloader” have been used once again to commit fraud. It is quite normal for people to search for these types of applications, for example to download YouTube videos to their smartphones, without having to become a premium YouTube customer. A fatal decision that users initially have no idea about.
Adware applications are well camouflaged
Once security researchers have discovered such applications, the search for those responsible begins. The result is an interesting search and search game that Eset describes in detail in German on his own blog. Even smart developers can hide, but they will eventually be exposed. In this case, the developer wasn’t particularly careful, but he eventually got greedy.
“At one point in his” career “on Google Play, he made a decision [Entwickler der Apps] ostensibly to increase your advertising revenue by incorporating adware features into your application code. The various camouflage and resistance techniques found in the app show us that the perpetrator was aware of the harmful nature of the additional features and therefore wanted to keep them hidden. “
Some affected applications:
Smart GallerySaveInstaVideo Downloader MasterMP4 Video DownloaderRingtone Maker 2019Free Video DownloaderWater drink reminder…
Eset notifies Google about detected apps, which are then generally removed from the Play Store fairly quickly. There are always new discoveries of this type.