Google has removed 16 "utility" apps that committed ad fraud by artificially increasing engagement on advertisements, using infected devices.
 
                The list of 16 malicious apps was published by security firm McAfee
 
            
            Google has reportedly removed 16 apps from the Play Store that were causing faster battery drain and higher network usage on users' devices. The applications, which were identified by a security firm, allegedly performed ad fraud by opening web pages in the background to click on advertisements while masquerading as a real user, according to a report. The apps had a total of 20 million installations, according to the security firm, before they were taken down from the Play Store.
According to a report by Ars Technica, Google has removed 16 applications from the Play Store, which were detected by McAfee. The apps, which were previously available to download on Android smartphones and tablets, were listed as utilty applications allowing users to scan QR codes, turn on the device's flash as a torch, or convert various measurements, as per the security firm.
The list of removed applications includes "utility" apps such as BusanBus, Joycode, Currency Converter, High-Speed Camera, Smart Task Manager, Flashlight+, K-Dictionary, Quick Note, EzDica, Instagram Profile Downloader, and Ez Notes.
McAfee found that these applications would download code once they were opened, which and receive notifications to to open web pages without alerting the user, clicking on links and advertisements. This activity would artificially raise the engagement on these ads, which is a form of ad fraud.
The security firm found that the apps that were removed came with adware code called "com.liveposting" and "com.click.cas", libraries that would allow them to click on links and advertisements. This would take place without a user's knowledge and cause additional battery drain and increased network usage.
Google told Ars Technica that all the applications were removed from the Play Store, and that Play Protect blocks these apps on users' devices. However, McAfee's report that the apps would download additional code after the apps were installed, suggests that they managed to bypass Google's protections on the Play Store.
Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.
 SpaceX Revises Artemis III Moon Mission with Simplified Starship Design
                            
                            
                                SpaceX Revises Artemis III Moon Mission with Simplified Starship Design
                            
                        
                     Rare ‘Second-Generation’ Black Holes Detected, Proving Einstein Right Again
                            
                            
                                Rare ‘Second-Generation’ Black Holes Detected, Proving Einstein Right Again
                            
                        
                     Starlink Hiring for Payments, Tax and Accounting Roles in Bengaluru as Firm Prepares for Launch in India
                            
                            
                                Starlink Hiring for Payments, Tax and Accounting Roles in Bengaluru as Firm Prepares for Launch in India
                            
                        
                     Google's 'Min Mode' for Always-on Display Mode Spotted in Development on Android 17: Report
                            
                            
                                Google's 'Min Mode' for Always-on Display Mode Spotted in Development on Android 17: Report