Date:12/01/18
Security researchers at the cybersecurity software company Check Point discovered a new adware, dubbed "LightsOut," hiding in 22 different flashlight and utility apps on Google Play, according to a new report released by the company on Friday. Check Point estimates that the adware affected between 1.5 million and 7.5 million downloads.
The apps have since been removed from Google Play, according to Check Point. Google did not respond to a request for comment.
Much like pop-up ads of the 1990's, LightsOut triggers ads on a user's phone, even when the user isn't in the app. These ads can be triggered by anything from a wi-fi connection, the end of a call, the plugging in of a charger, or locking of a screen, and continue to follow users even when they disable ads within the apps.
Some users with the adware said they were "forced to press on ads to answer calls and perform other activities on their device." according to Check Point. One user also reported seeing the ads after he had purchased an ad-free version of the app.
While this type of adware is an illegal method of generating ad revenues, it's not technically a virus, according to Check Point. The difference is that viruses self-replicate, whereas adware lives inside of the code for specific apps, and goes away once the app is deleted.
New Adware Discovered in 22 Apps in Google Play
Many security advocates tell Android users to only download apps from Google Play, the official store that Google operates for Android apps, in order to avoid viruses and spam. But even Google Play can fall victim to malicious code.Security researchers at the cybersecurity software company Check Point discovered a new adware, dubbed "LightsOut," hiding in 22 different flashlight and utility apps on Google Play, according to a new report released by the company on Friday. Check Point estimates that the adware affected between 1.5 million and 7.5 million downloads.
The apps have since been removed from Google Play, according to Check Point. Google did not respond to a request for comment.
Much like pop-up ads of the 1990's, LightsOut triggers ads on a user's phone, even when the user isn't in the app. These ads can be triggered by anything from a wi-fi connection, the end of a call, the plugging in of a charger, or locking of a screen, and continue to follow users even when they disable ads within the apps.
Some users with the adware said they were "forced to press on ads to answer calls and perform other activities on their device." according to Check Point. One user also reported seeing the ads after he had purchased an ad-free version of the app.
While this type of adware is an illegal method of generating ad revenues, it's not technically a virus, according to Check Point. The difference is that viruses self-replicate, whereas adware lives inside of the code for specific apps, and goes away once the app is deleted.
Views: 449
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World