Detects malicious code showing porn ads in children's games on Google Play
Check Point security company has discovered malicious code called AdultSwine that appears in children's games on Google Play.
Check Point security company has discovered malicious code called AdultSwine that appears in children's games on Google Play.
In these maliciously installed applications, AdultSwine displays pornographic and deceptive advertising images. More dangerous, this malicious code also tries to trick users into installing fake security applications that contain real malware and tries to trick them into signing up for high-cost services to trick money.
To minimize the risk of being removed, this malicious code can even hide its own icon on the user's device. Some of these malicious applications also mislead users by displaying false messages that your phone is infected with a virus and provide a malicious link that pretends to be an antivirus or notification engine. Suppose users win to trick them into providing phone numbers.
According to Reuters, this ad tends to appear in children's apps, such as Drawing Lessons Lego Ninjago. While playing, ads will appear on the screen and to return to the game faster than children even adults often tend to click on the advertising window.
These 63 applications were removed from Google Play by Google and the developer account was also locked, but previously had 3 to 7 million users download these applications.
See more:
- This is why you should say goodbye to Windows 7 and upgrade your device to Windows 10
- Warning: a new variant of the virus that fills virtual money via Facebook Messenger will appear every 10 minutes
- The Chrome gadget secretly exploits virtual money, making it slow
- Discovered a new line of malicious Android code that steals user data on the electronic application market
You should read it
- 14 games on the App Store contain malicious code, iPhone users be careful
- Warning: The new Facebook virus, a malicious code that is spreading rapidly through Messenger
- Android apps contain malicious code that uses motion sensors to avoid detection
- Warning: New malicious code is infecting about 500,000 router devices
- After WannaCry, Petya's 'extortion' malicious code is raging, this is a remedy to prevent
- 238 applications found on Play Store contain malicious code that paralyzes smartphones
- Malicious code is growing up
- Reader code names famous games to infiltrate Microsoft Store
- Find bug in Emotet malware, prevent it from spreading for 6 months
- Malware sneaks into iOS through Apple's official distribution channels
- 10 million Android devices are preinstalled with malicious code from the factory
- Appearing dangerous Android malicious code specializing in stealing chat content on Facebook Messenger, Skype ...
Maybe you are interested
Symptoms of drinking too much water you may not know Rjukan, the 'town without the sun' in Norway, had to set up a giant mirror to catch the sun How to connect PostgreSQL to Next.js application using Prisma How to Rotate Videos in iMovie How to record audio files in Windows 10 Get more free storage from Dropbox, Google Drive, Skydrive, Ubuntu One