Adware apps posing as photography apps, games tricked millions of Android usershttps://indianexpress.com/article/technology/mobile-tabs/adware-apps-posing-as-photography-apps-and-games-tricked-millions-of-android-users-5914411/

Adware apps posing as photography apps, games tricked millions of Android users

The security firm Trend Micro found 85 individual apps which have been downloaded more than eight million times from Google Play — all of which have since been removed from the app store.

adware apps, photography apps, games, adware games, google play store, adware apps posing as photography apps, adware apps posing as games
The security firm Trend Micro said it found 85 individual apps downloaded more than eight million times from Google Play. (Representational Image)

Millions of Android users have been tricked into downloading adware-laden apps posing as photo-editing apps and games. The security firm Trend Micro said it found 85 individual apps which have been downloaded more than eight million times from Google Play — all of which have since been removed from the app store.

Trend Micro provided a list of the apps — including Super Selfie Camera, Cos Camera, Pop Camera, and One Stroke Line Puzzle — all of which had a million downloads each. Most of these apps had as many one-star reviews as they did five-stars, with users complaining about the deluge of pop-up ads.

The security firm researchers found that the apps would hide their icon about 30 minutes after being installed and create a shortcut on the phone’s home screen. This prevented the apps from being uninstalled by dragging and dropping the icon to the Uninstall section.

To evade detection, the app uses Java reflection — which enables the runtime behaviours of an application to be inspected or modified, explained the security firm.

Advertising
adware apps, photography apps, games, adware games, google play store, adware apps posing as photography apps, adware apps posing as games
Screenshot of the applications embedded with adware. (Image source: Trend Micro)

The adware apps used to run on a user’s device and silently serve and click ads in the background to generate ad revenue. And all of this used to happen without the knowledge of the user. Apart from that, the apps also showed full-screen ads once it verified that the device has been unlocked.

Users could not close the app unless they have viewed the whole duration of the ad. Trend Micro said, “Users are forced to view the whole duration of the ad before being able to close it or go back to app itself.”

Also read | A fake ‘updates’ app tricked millions of Samsung users: Here’s what happened

Fraudsters can also remotely configure how often the ads are displayed on affected devices, allowing ads to be displayed more frequently than the default five-minute intervals. The code also checks to make sure it doesn’t show the same ad too frequently, the researchers said.