Google Play has launched 16 apps with more than 20 million combined installs after researchers discovered malicious activity that could cause the Android devices they ran on to drain faster and consume more data than usual.
The apps offered legitimate features, including flashlight, camera, QR reading and measurement conversions, security firm McAfee said Wednesday. However, when opened, the apps surreptitiously downloaded additional code, committing ad fraud. From then on, infected devices received messages through the Google-operated Firebase Cloud Messaging platform instructing them to open specific web pages in the background and select links to artificially increase the number of clicks received on ads.
“It mainly involves visiting websites delivered by an FCM message and sequentially browsing them in the background while mimicking the user’s behavior”wrote McAfee’s SangRyol Ryu. “This can cause heavy network traffic and consume power without the user’s awareness during the time it generates profit for the threat actor behind this malware.”
The message contained the following screenshot that illustrates a small sample of the additional network requirements a device created when performing the fraud.
All malicious apps came with a library of code called com.liveposting, which acts as an agent and runs hidden adware services. Other apps also came with an additional library called com.click.cas, which focused on the automated click functionality. To hide the fraudulent behavior, the apps waited about an hour after installation before executing the libraries.
Advertising fraud works through affiliate programs, which allow a third party to receive a portion of the advertising revenue in exchange for providing links that direct end users to advertisements. Instead of bringing real users to the site, the fraudsters simulate the referral using bots or other automated methods to mimic real user engagement.
The apps detected by McAfee include:
Packaging Name | SHA256 | Name | downloaded |
com.hantor.CozyCamera | a84d51b9d7ae675c38e260b293498db071b1dfb08400b4f65ae51bcda94b253e | High Speed Camera | 10,000,000+ |
com.james.SmartTaskManager | 00c0164d787db2ad6ff4eeebbc0752fcd773e7bf016ea74886da3eeceaefcf76 | Smart Task Manager | 5,000,000+ |
kr.caramel.flash_plus | b675404c7e835febe7c6c703b238fb23d67e9bd0df1af0d6d2ff5ddf35923fb3 | Flashlight+ | 1,000,000+ |
com.smh.memokalender | 65794d45aa5c486029593a2d12580746582b47f0725f2f002f0f9c4fd1faf92c | 달력 메모장 | 1,000,000+ |
com.joysoft.wordBook | 82723816760f762b18179f3c500c70f210bbad712b0a6dfbfba8d0d77753db8d | K-dictionary | 1,000,000+ |
com.kmshack.BusanBus | b252f742b8b7ba2fa7a7aa78206271747bcf046817a553e82bd999dc580beabb | BusanBus | 1,000,000+ |
com.candlecom.candleprotest | a2447364d1338b73a6272ba8028e2524a8f54897ad5495521e4fab9c0fd4df6d | Flashlight+ | 500,000+ |
com.movinapp.quicknote | a3f484c7aad0c49e50f52d24d3456298e01cd51595c693e0545a7c6c42e460a6 | quick note | 500,000+ |
com.smartwho.SmartCurrencyConverter | a8a744c6aa9443bd5e00f81a504efad3b76841bbb33c40933c2d72423d5da19c | Currency Converter | 500,000+ |
com.joysoft.barcode | 809752e24aa08f74fce52368c05b082fe2198a291b4c765669b2266105a33c94 | Joy code | 100,000+ |
com.joysoft.ezdica | 262ad45c077902d603d88d3f6a44fced9905df501e529adc8f57a1358b454040 | EzDica | 100,000+ |
com.schedulezero.instapp | 1caf0f6ca01dd36ba44c9e53879238cb46ebb525cb91f7e6c34275c4490b86d7 | Instagram profile downloader | 100,000+ |
com.meek.tingboard | 78351c605cfd02e1e5066834755d5a57505ce69ca7d5a1995db5f7d5e47c9da1 | Ez Comments | 100,000+ |
com.candlencom.flashlite | 4dd39479dd98124fd126d5abac9d0a751bd942b541b4df40cb70088c3f3d49f8 | 손전등 | 1000+ |
com.doubleline.calcul | 309db11c2977988a1961f8a8dbfc892cf668d7a4c2b52d45d77862adbb1fd3eb | 계산기 | 100+ |
com.dev.imagevault | bf1d8ce2deda2e598ee808ded71c3b804704ab6262ab8e2f2e20e6c89c1b3143 | Flashlight+ | 100+ |
In a statement, a Google spokesperson noted that all apps reported by McAfee had been removed. The representative further said: “Users are also protected by Google Play Protect, which blocks these apps on Android devices.” The spokesperson did not answer a follow-up question asking how the apps have generated 20 million installs when blocked.