[ad_1]
Android users who think that apps downloaded from the Google Play Store are safe and secure are mistaken in many cases. Malware and other fraudulent applications are often prevalent in the Google Play Store. According to a new report, seven applications from Cheetah Mobile and one from Kika Tech, which total 2 billion downloads via Google Play, are part of a large advertising fraud plan. Both companies are related. Kika Tech would have had a major investment from Cheetah in 2016.
The system of ad fraud was According to the researchers, these fraudulent apps would have stolen millions of dollars. Together, Cheetah and Kika claim to have 700 million monthly active users accessing their mobile apps. These apps were stealing money from advertisers. As the owner of the device, this one would notice a shorter usage time because the battery was emptied by illegitimate transactions taking place in the background.
The applications that Cheetah and Kika used in the advertising scheme followed the moment when users downloaded new applications and used this data to request credit for having caused the download. Many developer partners pay between 50 cents and US $ 3 to encourage users to download their apps. This is so that both companies allegedly used their harmful apps to make money. This type of fraud is known as flooding of clicks and clicks, which allows the author to receive a premium for the installation of apps while it has nothing to do with it. the actual installation.
Grant Simmons, head of customer badysis at Kochava, said: "It's a robbery – no other way of saying it." The Cheetah and Kika applications that have been identified in the fraud scheme include Clean Master, Security Master, CM Launcher 3D, Kika Keyboard, Battery Doctor, Cheetah Keyboard, CM Locker and CM File Manager.
Kochava sent Kika Tech a video of his Kika Keyboard application engaging in fraudulent practices and Kika's US general manager, Marc Richardson, said that Kika "has no intention of engaging in fraudulent practices ". Richardson continued, "Kika Keyboard is a great, well-known application that helps its users communicate in different ways and we are extremely disappointed to learn about these flooding and injection practices and we thank you for your attention. "
Kika's CEO says that the company is investigating fraudulent practices and claims that any advertising fraud has occurred without his knowledge. Kochava indicates that the application Kika Keyboard uses the company's proprietary software to commit fraud and that functions are integrated with the application itself. Simmons, of Kochava, said: "No one came in and did not handle anything." Kochava counted both Cheetah and Kika as customers when he unveiled to the developers the alleged click fraud. This fraud again highlights the lax security of the Google Play store and the slowness with which Google reacts to fraudulent apps when they are discovered.
Recently, gaming applications containing malware that claimed to drive simulators of various types proved to be full of malware and had been downloaded 580,000 times in total. Earlier this year, a QR code reader application downloaded more than 500,000 times was infected with malware.
Source link