Tuesday, April 13, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Privacy

42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese Student

October 25, 2019
in Internet Privacy
42 Adware Apps with 8 Million Downloads Traced Back to Vietnamese Student
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

First of all, if you have any of the below-listed apps installed on your Android device, you are advised to uninstall it immediately.

Cybersecurity researchers have identified 42 apps on the Google Play Store with a total of more than 8 million downloads, which were initially distributed as legitimate applications but later updated to maliciously display full-screen advertisements to their users.

You might also like

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data

What Does It Take To Be a Cybersecurity Researcher?

Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021

Discovered by ESET security researcher Lukas Stefanko, these adware Android applications were developed by a Vietnamese university student, who easily got tracked likely because he never bothered to hide his identity.

The publicly available registration details of a domain associated with the adware apps helped find the identity of the rogue developer, including his real name, address, and phone number, which eventually led the researcher to his personal accounts on Facebook, GitHub, and YouTube.

“Seeing that the developer did not take any measures to protect his identity, it seems likely that his intentions weren’t dishonest at first,” Stefanko said in a blog post published today.

“At some point in his Google Play career, he apparently decided to increase his ad revenue by implementing adware functionality in his apps’ code.”

Since all 42 adware apps provide original functionalities they promised, like Radio FM, video downloader, or games, it is quite difficult for most users to spot rogue apps or find anything suspicious.

Adware Tricks for Stealth and Resilience

Dubbed “Ashas” adware family, the malicious component connects to a remote command-and-control server operated by the developer and automatically sends basic information about the Android device with one of the adware apps installed.

google android app adware malware

The app then receives configuration data from the C&C server responsible for displaying ads as per the attacker’s choice and applying a number of tricks for stealth and resilience, some of which are mentioned below.

In order to hide its malicious functionality from the Google Play security mechanism, the apps first check for the IP address of the infected device, and if it falls within the range of known IP addresses for Google servers, the app will not trigger the adware payload.

To prevent users from immediately associating the unwanted ads with his app, the developer also added functionality to set a custom delay between displaying ads and the installation of the app.

Web Application Firewall

In addition, the apps also hide their icons on the Android phone’s menu and create a shortcut in an attempt to prevent uninstallation.

“If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user’s knowledge,” Stefanko said.

What’s interesting? If the affected user heads on the “Recent apps” button to check which app is serving ads, the adware displays Facebook or Google icon to look legitimate and avoid suspicion, tricking users into believing the ads are being displayed by a legitimate service.

Though Stefanko did not talk much about the kind of advertisements this adware serves to the infected users, adware typically bombards infected devices with advertisements, mostly leading to scam, malicious, and phishing websites.

Stefanko reported the Google security team of his findings, and the company removed the apps in question from its Play Store platform.

However, if you have downloaded any of the above-listed rogue apps on your Android device, immediately remove it by going into your device settings.

Apple iOS users are also advised to check their iPhones for these apps, as the malicious developer also has apps on Apple’s App Store. However, as for now, none of them contain any adware functionality.


Credit: The Hacker News By: noreply@blogger.com (Unknown)

Previous Post

Is open source the way to go for observability? Grafana Labs scores $24M Series A funding to try to prove this

Next Post

UN, UNICEF, Red Cross officials targeted in recent phishing campaign

Related Posts

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data
Internet Privacy

Indian Brokerage Firm Upstox Suffers Data Breach Leaking 2.5 Millions Users’ Data

April 13, 2021
What Does It Take To Be a Cybersecurity Researcher?
Internet Privacy

What Does It Take To Be a Cybersecurity Researcher?

April 12, 2021
Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021
Internet Privacy

Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2Own 2021

April 12, 2021
Hackers Tampered With APKPure Store to Distribute Malware Apps
Internet Privacy

Hackers Tampered With APKPure Store to Distribute Malware Apps

April 10, 2021
[WHITEPAPER] How to Achieve CMMC Security Compliance for Your Business
Internet Privacy

[WHITEPAPER] How to Achieve CMMC Security Compliance for Your Business

April 10, 2021
Next Post
UN, UNICEF, Red Cross officials targeted in recent phishing campaign

UN, UNICEF, Red Cross officials targeted in recent phishing campaign

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Apple looking to close the gap between web and app privacy
Internet Security

Who do I pay to get the ‘phone’ removed from my iPhone?

April 13, 2021
Robust Artificial Intelligence of Document Attestation to Ensure Identity Theft
Data Science

Robust Artificial Intelligence of Document Attestation to Ensure Identity Theft

April 13, 2021
Data Science And Machine Learning Service Market Growth Due to COVID-19 Spread | ZS, LatentView Analytics, Mango Solutions, Microsoft, International Business Machine – KSU
Machine Learning

Data Science And Machine Learning Service Market Growth Due to COVID-19 Spread | ZS, LatentView Analytics, Mango Solutions, Microsoft, International Business Machine – KSU

April 13, 2021
How to Change the WordPress Admin Login Logo
Learn to Code

Intl.NumberFormat

April 13, 2021
Criminals spread malware using website contact forms with Google URLs
Internet Security

Criminals spread malware using website contact forms with Google URLs

April 13, 2021
Trends in custom software development in 2021
Data Science

Trends in custom software development in 2021

April 13, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Who do I pay to get the ‘phone’ removed from my iPhone? April 13, 2021
  • Robust Artificial Intelligence of Document Attestation to Ensure Identity Theft April 13, 2021
  • Data Science And Machine Learning Service Market Growth Due to COVID-19 Spread | ZS, LatentView Analytics, Mango Solutions, Microsoft, International Business Machine – KSU April 13, 2021
  • Intl.NumberFormat April 13, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates