Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Google Play Works to Reduce Ad-Fraud

Google Play Works to Reduce Ad-Fraud

What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put their users at risk for their own benefit. Recently, Google has removed 22 apps from the Google Play Store that were found to contain automated click-fraud scripts. We’ll delve into what these developers were up to with these fraudulent applications, as well as how they would affect the two-million users that downloaded them.

What Are the Apps?
Below you’ll find a list of what the affected apps are:

  • Sparkle FlashLight
  • Snake Attack
  • Math Solver
  • ShapeSorter
  • Tak A Trip
  • Magnifeye
  • Join Up
  • Zombie Killer
  • Space Rocket
  • Neon Pong
  • Just Flashlight
  • Table Soccer
  • Cliff Diver
  • Box Stack
  • Jelly Slice
  • AK Blackjack
  • Color Tiles
  • Animal Match
  • Roulette Mania
  • HexaFall
  • HexaBlocks
  • PairZap

What Was Wrong with Them?
SophosLabs detected a cache of apps that are outfitted with a feature they call “Andr/Clickr-ad” malware. These applications are designed to be as flexible as possible with the intention of contacting a common attacker-controller server to download an ad-fraud module. This happens every 80 seconds. The malware opens up a non-visible window that repeatedly clicks on ads. This makes the network look like it’s getting more traffic and generates fraudulent revenue for the developer.

Sophos didn’t identify a specific ad network, but the users who had downloaded these apps experienced a considerable amount of battery drain and an increase in data usage. One interesting note is that some of the ad traffic was identified as coming from iPhones, even though these apps generally only appear on Android devices. The traffic came from “Apple models ranging from iPhone 5 to 8 Plus and from 249 different forged models from 33 distinct brands of Android phones.” This kind of strategy was used to increase profits for advertisers who had to pay a premium for their ads to run on Apple devices. iOS versions of the apps, even those by the same developers, didn’t have malicious code integrated.

Only Download Legitimate Applications
One way to make sure you don’t have troubles with your downloaded apps is to make sure you only download legitimate applications. Here are some ways to determine if the app you want is legitimate:

  • Read a lot of reviews: You can find out a lot about applications just by reading some of the reviews. Try to read eight or more reviews to make sure that the app is as functional as you think it is.
  • Check the app permissions: Some applications need your permission in order to accomplish certain tasks. Always check these permissions before downloading anything. For example, if an application needs access to your text messages or camera, when it clearly shouldn’t be asking for them, you should think twice before downloading.
  • Check the terms and conditions: It might be tempting to skip the terms and conditions, but you don’t want to do this for smartphone apps. Even if you try to read them, the legal language used might be unnerving. Still, the terms and conditions might hold some insights into how the data collected by the application is used.
  • Research the developer: Software development is a competitive field, so people are always looking for ways to differentiate themselves and further their ambitions. Unfortunately, ambition doesn’t always lead to ethical business practices. Do some research into who developed the applications and determine if you can trust who created the tool you’re about to download.

The Google Play Store holds countless applications, so be on the lookout for any apps that threaten your device’s integrity. Just stick to your best practices and it’s unlikely that you’ll encounter and download something dangerous. To learn more about this kind of mobile device security, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 08 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Cybersecurity Communication Data Backup Smartphone Managed Service Android Upgrade Business Management Smartphones Data Recovery AI VoIP Mobile Devices communications Disaster Recovery Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Facebook Gadgets Cloud Computing Covid-19 Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Business Technology Wi-Fi Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Data Security Mobile Office Vendor App Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple Access Control Computing Conferencing Information Technology Hacker Avoiding Downtime How To Office 365 BDR Marketing HIPAA Applications WiFi Health Big Data Help Desk Operating System Retail 2FA Healthcare Risk Management Computers Managed IT Services Analytics Website Office Tips Augmented Reality Storage Password Router Bring Your Own Device Virtual Private Network Paperless Office Infrastructure Going Green Social Monitoring Document Management Cybercrime Windows 11 Remote Workers Customer Service Telephone Scam Data loss Excel Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Solutions Physical Security Display Printer The Internet of Things Holidays Data Storage Smart Technology Settings Video Conferencing Machine Learning Managed Services Provider Printing Wireless Saving Time Virtual Machines Professional Services Content Filtering Customer Relationship Management YouTube Managed IT Service Maintenance Cryptocurrency Supply Chain Downloads Hacking Antivirus iPhone Presentation Licensing Virtual Desktop Entertainment Data storage Vulnerabilities LiFi Wireless Technology Images 101 Outlook Multi-Factor Authentication Money Robot Mobility Telephone System Word Cost Management Humor Data Privacy Sports IT Management VPN Employees Meetings Mouse Integration Safety User Tip Modem Administration Processor Computer Repair Mobile Security Proxy Server Reviews Workforce Cookies Legal Monitors Cyber Monday Medical IT IT solutions Threats Tactics Development Hotspot Transportation Business Growth Workplace Strategies Websites Mirgation Hypervisor Application Shopping Meta Nanotechnology Optimization PowerPoint Cortana SharePoint Amazon Addiction Electronic Medical Records Language Employer/Employee Relationships Alt Codes IBM Chatbots Navigation Downtime Management PCI DSS Lenovo Gig Economy Outsource IT Screen Reader Writing Distributed Denial of Service Hosted Solution Environment Service Level Agreement Internet Service Provider Media Virtual Reality Computing Infrastructure Teamwork Typing Private Cloud Identity Evernote Server Management Regulations Compliance Superfish Bookmark Small Businesses Identity Theft Smart Tech Memes Google Drive Competition Knowledge Displays Download Net Neutrality Twitter Alerts SQL Server Error History 5G Financial Data Browsers Smartwatch Outsourcing Connectivity IT Google Docs Social Engineering Break Fix Unified Communications Experience Running Cable User Upload Procurement Remote Computing Azure Bitcoin Workplace Cyber security Google Wallet Multi-Factor Security Tech Social Network Telework CES Hiring/Firing Tablet IoT Communitications Dark Web IP Address Laptop Trends Supply Chain Management Paperless Alert Windows 8 Co-managed IT File Sharing Regulations Drones Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Data Analysis Technology Care Star Wars IT Assessment How To Microsoft Excel Halloween Recovery Gamification Flexibility Business Communications Notifications Staff Value Scams Travel Social Networking Legislation Hard Drives Organization Techology Fileless Malware Digital Security Cameras Hybrid Work Google Maps Smart Devices Domains Scary Stories Content Remote Working Human Resources Wearable Technology Memory Hacks Health IT Cables Unified Threat Management Motherboard Data Breach Comparison Google Play Refrigeration Fun Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Deep Learning Public Speaking Wasting Time Lithium-ion battery Google Apps IT Maintenance Trend Micro Network Congestion Specifications Security Cameras Education Entrepreneur User Error Microchip Business Intelligence Internet Exlporer Software as a Service Fraud Managing Costs Mobile Computing Username Shortcuts Ransmoware Point of Sale eCommerce Black Friday SSID Undo Search Vendors Database Surveillance Virtual Assistant Best Practice Tech Support IT Technicians Virtual Machine Buisness Network Management Be Proactive

Blog Archive