Click to Skip Ad
Closing in...
  1. Amazon Deals
    07:59 Deals

    10 deals you don’t want to miss on Sunday: Rare Nest Thermostat sale, Alexa in your…

  2. Amazon Deals
    07:58 Deals

    10 deals you don’t want to miss on Saturday: $5 Alexa smart plugs, $110 electric sta…

  3. Self-Emptying Robot Vacuum
    16:11 Deals

    Amazon coupon slashes our favorite self-emptying robot vacuum to its lowest price ever

  4. Best Amazon Finds 2021
    08:49 Deals

    5 must-have Amazon devices you might’ve never even heard of

  5. Buy Fire TV Stick 4K Sale
    18:11 Deals

    20% off when you buy a Fire TV Stick 4K in Amazon’s surprise sale




Yet again, adware-infected Android apps rack up millions of Google Play Store downloads

October 24th, 2019 at 9:07 PM
Android apps

Researchers associated with ESET, a cybersecurity research company, have uncovered the latest variant of a scheme we’ve been reporting on different iterations of for a while now. It’s the latest batch of adware-infected Android apps to have been discovered lurking in the Google Play Store — a total of 42, all of which seem to have since been booted from Google’s app marketplace. But not, of course, before racking up millions of downloads.

The apps in question included titles like Ringtone Maker Pro and SaveInsta, both of which were downloaded some half a million times. As ESET security researcher Lukas Stefanko explains in a post detailing what the team uncovered, these kinds of apps tend to serve ads that take up a device’s full screen randomly once they’ve been downloaded. And the adware-laden apps in questions employed some tricks to keep their secret purpose hidden for as long as possible.

While all that was happening, the apps were also quietly capturing data about the user’s device that could be used later. The thing that appears to have allowed them to sneak into the Google Play Store is the apps’ ability to check and see if they’re being tested by the Play Store’s security mechanisms. If the app thinks that’s the case, the app won’t let its adware payload be triggered, according to ESET.

These, by the way, are the apps ESET says it reported to Google:

“Based solely on open-source intelligence, we were able to trace the developer of the … adware and establish his identity and discover additional related adware-infected apps,” Stefanko writes in his post. “Seeing that the developer did not take any measures to protect his identity, it seems likely that his intentions weren’t dishonest at first — and this is also supported by the fact that not all his published apps contained unwanted ads.

“At some point in his Google Play ‘career,’ he apparently decided to increase his ad revenue by implementing adware functionality in his apps’ code. The various stealth and resilience techniques implemented in the adware show us that the culprit was aware of the malicious nature of the added functionality and attempted to keep it hidden.”

Andy is a reporter in Memphis who also contributes to outlets like Fast Company and The Guardian. When he’s not writing about technology, he can be found hunched protectively over his burgeoning collection of vinyl, as well as nursing his Whovianism and bingeing on a variety of TV shows you probably don’t like.




Popular News