![]() However, once they passed any antivirus a user might have, the OOC ads were able to stay undetected for a period of time by pretending to be coming from popular applications and social-media platforms, such as YouTube and Chrome. “They cloak and allow a threat to exist under the guise of intellectual property protection. ![]() ![]() “The main tool in the adware developer’s arsenal are the packers,” Gabriel Cirlig, principal threat intelligence analyst for White Ops, told Threatpost. The apps would then deliver OOC ads disguised to appear as if they were from reputable sources like Chrome and YouTube, according to the White Ops team. Most were simple retro games like Nintendo NES emulators, and used “ packer” software to bypass protections. The apps worked the way they were supposed to, for the most part, making them all the more effective at hiding in plain sight. The apps have since been purged from Google Play, but users should delete them off their phones as well. Researchers with White Ops have uncovered a scam to deliver millions of out-of-context (OOC) ads through a group of more than 240 Android applications on the official Google Play store, which the team said were collectively delivering more than 15 million impressions per day at their peak.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |