The apps are caught in a $ 1 million fraudulent scheme; Clean Master involved



[ad_1]

Cheetah Mobile, a Chinese application developer, and its subsidiary Kika Tech have reportedly been trapped by a fraudulent scheme that has diverted millions of dollars from advertisers. Among the applications developed by Cheetah are Clean Master, which has more than one billion users worldwide.

Criminal practice goes through a click injection

The person who revealed the scheme was the company Kochava analysis, commenting that Cheetah Mobile and Kika had misled advertisers by stating false results by indicating the installation of third-party applications. This activity works as follows: a developer can enter into an agreement with another to announce its application in another application – the shock lies in the false claim that the third application has been installed on a larger number of devices.

Typically, developers with large apps running this ad will pay between $ 0.50 and $ 3 per recommended install. In this way, Cheetah Mobile and Kika Tech improperly used user permissions to track the download of their new apps and even used this data to steal money from apps installed by other referral sites.

Kochava 's chief of analysis, Grant Simmons, told Buzzfeed News that there was no other word to define the action: "C & # 39; It's theft, it's real companies doing it – on a scale – not a random person in their basement. "

For you, end user, what does it mean? If you have some of the applications listed below, perform the uninstall.

For you, end user, what does it mean? If you have some of the applications listed below, perform the uninstall. The developer, in addition to committing the crime of fraud, collected the data of its users in an unethical way.

Google is investigating the case for action. Kika Tech said that she "does not intend to engage in fraudulent practices" and that she "will do everything in her power to rectify the situation quickly and exhaustively and prosecute the persons involved ". Cheetah Mobile has blamed third party SDKs (software development kits) or ad networks for the injection of clicks, but when Kochava pointed out that the SDK involved in the activity of click fraud belongs and is developed by Cheetah Mobile itself, and not Cheetah has denied the involvement of its SDK in advertising fraud, according to The Hacker News.

Applications to avoid:

  • Clean Master
  • Security Master
  • CM Launcher 3D
  • Doctor Battery
  • Guépard keyboard
  • CM Locker
  • CM File Manager
  • Kika Keyboard

TecMundo Discount Coupons:

[ad_2]
Source link