Skip to main content

Popular Android Apps Like Clean Master Reportedly Caught Committing 'Ad Fraud'




Popular Android Apps Like Clean Master Reportedly Caught Committing 'Ad Fraud'

HIGHLIGHTS

  • Google Play Store apps have been found to be engaging in ad fraud
  • 8 apps with over 2 billion downloads are said to be a part of the scheme
  • They are said to have been exploiting user permissions
A number of Android apps developed by two popular Chinese developers have been found to be involved in an ad fraud scheme. An app analytics firm discovered that eight apps on Google Play Store with more than two billion downloads have been exploiting user permissions to steal "millions of dollars". Seven of these apps come from Cheetah Mobile, a Chinese internet company, while the other one has been developed by Kika Tech, another Chinese firm. These apps reportedly boast of over 700 million monthly active users.
As per app analytics firm Kochava, which shared its report with Buzzfeed News, the two firms have been misusing app permissions in order to monitor new downloads and then used the data to claim credit for having caused the download. The report explains that the ad fraud scheme exploits the fact that several app developers pay a bounty ranging from 50 cents (roughly Rs. 35) to $3 (roughly Rs. 200) to partners that help them get more installations of their apps. Cheetah and Kika have essentially been using click flooding and click injection techniques to get app-install bounties even without playing any role in app installations.
The apps developed by Cheetah include Clean Master, CM File Manager, CM Launcher 3D, Security Master, Battery Doctor, CM Locker, and Cheetah Keyboard. As per data from AppBrain analytics service, these Android apps are quite popular since they were downloaded more than 20 million times in the last 30 days itself. It is interesting to note that Google had promoted the CM Launcher 3D app as one of Google Play's "go-to apps"
Meanwhile, the other app named as a part of the ad fraud scheme is the Kika Keyboard. It is reportedly Google Play Store's most popular keyboard app with over 60 million monthly active users. These apps reportedly ask users to provide a plethora of permissions, including the ability to track keystrokes or other downloaded apps.
Kika Tech CEO Bill Hu, in a statement to BuzzFeed News, said that the ad fraud took place "without the company's full knowledge." He added that the company is internally investigating the issue and will "rectify the situation" in case "code has been placed inside our product". Meanwhile, Cheetah Mobile also issued a statement to BuzzFeed News suggesting that third-party software development kits (SDKs) integrated into its apps were responsible for the click injection. "We request ads via SDK from these ad platforms and display their ads. We have no control over the behaviour of these SDKs," the company was quoted as saying.
The latest report comes less than a month after an investigation had uncovered that over 125 Android apps were using a system of bots and shell companies to steal ad revenue. The report had resulted in Google removing several apps from its Play store, Also, recently the company pulled 13 apps containing malwarethat were downloaded half a million times. Coming to the latest issue involving Cheetah Mobile and Kika Tech, Google has told BuzzFeed News that it is still investigating.

Comments

Title

Link

https://amzn.to/3isoLUX https://www.amazon.in/gp/product/B082PFY9S7?smid=AT95IG9ONZD7S&psc=1&linkCode=sl1&tag=mywebsit0749e-21&linkId=5108a27204271760a5ba4d6108af7893&language=en_IN&ref_=as_li_ss_tl https://amzn.to/3ist5DR https://amzn.to/3s5ZcMQ

PUBG Mobile Season 4: Release date, season Royale Pass, new features and more

PUBG Mobile Season 4 release date, new features and more: The Battle Royale game, Player Unknown's Battlegrounds for Mobile, will get revamped for its fourth season later this week. PUBG Mobile Season 4 launch, Royale pass, and latest features:  Player Unknown’s Battlegrounds (PUBG) will refresh its mobile version for a fourth season. An update for the same had also been acknowledged by the company through Twitter. The third season of the Battle Royale game, popularly known as PUBG, ended on November 18. Here’s when PUBG Mobile Season 4 starts, and the new features it will bring. PUBG Mobile Season 4: Release date Smartphone gamers will have to wait until November 20 for the new season of PUBG. The global servers for the game are expected to be connected by November 21, which is when all devices are expected to receive access for the same. New and existing players should note that the latest version of PUBG will not take the Season 3 rankings and scores into accoun...

Vision is alive and will defeat Thanos in Avengers Endgame. Here’s how

If the latest fan theory turns out to be true, then Vision's consciousness will give the Marvel superheroes an upper hand and he might be the actual reason behind the Mad Titan's defeat in Avengers: Endgame. Actor Paul Bettany plays Vision in Marvel Cinematic Universe. Vision, played by actor Paul Bettany, might be alive and have a pivotal role in Avengers: Endgame. Infact, he will be instrumental in defeating Thanos in the final battle. But how can that happen, considering Vision was left all cold and grey when Thanos ripped him off the Mind Stone in last year’s blockbuster, Avengers: Infinity War? Going by a new fan theory doing the rounds, there is a catch! Vision is an  android  which was created by Tony Stark and Bruce Banner during Avengers: Age of Ultron. He was brought to life by the Mind Stone stuck on his forehead. In one of the most emotional scenes of Avengers: Infinity War, we saw Scarlet Witch aka Wanda destroying the Mind Stone that ensured Vision bro...

Ways To Earn CryptoCurrency For Free

  Some Websites Are Listed Below For Earning:- 1.  Sphere by Horizen 2. GramFree 3.  Earnabl y 4. Crypto Tab Browser 5. Honey 6. Coinpayu Sphere by Horizen Due to a change of the Application ID in v1.2.6-beta, Windows users upgrading from 1.2.5-beta or earlier or setups with multiple user accounts must uninstall Sphere by Horizen first, using the "Programs" utility from the "Control Panel" before installing any version greater than v1.2.5-beta. Please follow the upgrade guides for  Windows  or  macOS . Latest Version:   v1.2.8-beta For a list of changes implemented in this version, please view the  changelog . Due to significant improvements to data handling, users who took part in version 1.0.1-beta or earlier are advised to create new accounts and restore their wallet seeds. An upgrade mechanism will be included in a future release to remove the requirement on the user to perform this step. User  manual:   https://horizenofficial.atlas...

CISCE Releases ISC/Class 12 Board Exam 2019 Date Sheet

Council for Indian School Certificate Examination (CISCE) has released the date sheet for ISC (Class 12) and ICSE (Class 10) board exam 2019. ICSE 2019 Timetable: ISC Class 12 Exam 2019 Time Table Released New Delhi:  Council for Indian School Certificate Examination (CISCE) has released the date sheet for ISC (Class 12) and  ICSE  (Class 10) board exam 2019 . The exam for ISC or class 12 students will begin on February 4, 2019 and conclude on March 25, 2019. The exams will begin with practical exams which are scheduled from February 4 to February 14, 2019. The Theory component will begin with Economics paper exam on February 15, 2019. The date sheet is also available on the official website. Students can check the detailed exam schedule below.  ISC (Class 12) Board Exam 2019 Schedule February 04, 2019 (9.00 AM): Art Paper 3 (Drawing or Painting of a Living Person) February 05, 2019 (9.00 AM): Physics - Paper 2 (Practical) February 06, 2019 (...

Terrorist Lived 10 km From Site Where He Killed 40 Soldiers In Kashmir

More than 40 people were killed when the Jaish-e-Mohammad terrorist rammed a vehicle loaded with explosives into a CRPF convoy in Jammu and Kashmir's Pulwama. Pulwama attack: Adil Ahmad Dar joined Jaish-e-Mohammad last year. Story Highlights Adil Ahmad Dar, 22, joined terror group Jaish-e-Mohammad last year He was also known as "Adil Ahmad Gaadi Takranewala" Police say he is the third local suicide terrorist recruited by Jaish New Delhi:  Adil Ahmad Dar, the Jaish-e-Mohammad terrorist behind the worst-ever terror attack on security forces in Jammu and Kashmir, lived just 10 km from the spot where he rammed his car full of explosives into a security convoy, killing over 40 Central Reserve Police Force (CRPF) personnel on Thursday. Also known as "Adil Ahmad Gaadi Takranewala" and "Waqas Commando of Gundibagh", he joined the Pakistan-based terror outfit last year. On Thursday, he  drove towards the convoy of 78 CRPF buses tr...

2.0 Box Office Collection Day 1: Rajinikanth And Akshay's Film, Hindi Version, Gets 'Super Start'

2.0 , starring Rajinikanth and Akshay Kumar, collected Rs 20.25 crore on the opening day Rajinikanth in a still from  2.0 . (Image courtesy:  YouTube ) Story Highlights " 2.0 's business is strong," say trade pundits 2.0 opened to favourable reviews on Thursday 2.0 is the sequel to 2010 film Enthiran New Delhi:  2.0 , starring Rajinikanth and  Akshay Kumar , collect a little Rs 20 crore - Hindi version only - on the opening day, reported trade analyst Taran Adarsh. "Non-holiday release, non-festival period and yet,  2.0  takes a super start. Keeping in mind the fact that it's a dubbed film and the advance bookings opened very late, the business is strong. Thu Rs 20.25 crore (Hindi version)," he tweeted. Going by the film's pre-release hype, trade pundits thought  2.0  had a good chance to beat  Thugs Of Hindostan 's opening day collection number (Rs 50 crore in Hindi). However,  Thugs of Hindostan 's box office g...

Network security policy

Network security policy This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy  Summary Every company’s network is made up of devices that transmit and store information. This can include internal and external systems, either company-owned or leased/rented/subscribed to. To protect company data and reputation, it is essential to ensure that the network is secured from unauthorized access, data loss, malware infestations, and security breaches. This must be done via systematic end-to-end controls. Policy details The IT department will be responsible for implementing, adhering to, and maintaining these controls. For the purposes of this document, “all devices” refers to workstations, laptops, servers, switches, routers, firewalls, mobile devices, and wireless access points. Where possible, these guidelines will...