Connect with us

News

Google Removes Apps with Over 20 Million Downloads for Using Excess Mobile Data and Killing Battery

Published

on

Google Play Store

Google Play Store is home to millions of applications. Most of these apps check with Google’s security and privacy policies that have been laid down by the company.  Google Play removed 16 such applications with more than 20 million downloads combined for committing ad fraud. 

The applications, which were identified by a security firm, allegedly performed ad fraud by opening web pages in the background to click on advertisements while masquerading as real users.

Google has removed 16 applications from the Play Store, which were detected by McAfee. The apps, which were previously available to download on Android smartphones and tablets, were listed as utility applications allowing users to scan QR codes, turn on the device’s flash as a torch, or convert various measurements, as per the security firm.

Google Play Store removes 16 Battery Draining Apps

The list of the app contains utility apps that allow users to scan QR codes, turn on flash as a torch, and convert measuring units. Some of the now-removed apps are Bus, Joycode, Currency Converter, High-Speed Camera, Smart Task Manager, Flashlight+, K-Dictionary, Quick Note, EzDica, Instagram Profile Downloader, and Ez Notes.

McAfee found that these applications would download code once they were opened, which and receive notifications to open web pages without alerting the user, clicking on links and advertisements. This activity would artificially raise engagement on these ads, which is a form of ad fraud.

These apps came with adware code com.liveposting

The security firm found that the apps that were removed came with adware codes called “com.liveposting” and “com.click.cas”, libraries that would allow them to click on links and advertisements. This would take place without a user’s knowledge and cause additional battery drain and increased network usage.
These malicious apps allegedly performed ad fraud on Android users, which end up opening web pages in the background on advertisements while claiming to be real users. Once the application is opened, it downloads its remote configuration by executing an HTTP request. After the configuration is downloaded, it registers the FCM (Firebase Cloud Messaging) listener to receive push messages.? the report is added. At a glance, it looks like the real android software, however, it was masquerading as an ad fraud app
Thanks for reading!!
See also  Get Apple’s Dynamic Island on your Android phone with this App
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Copyright © 2020 - 2021 TechZimo.com, All rights reserved.