Friday, March 29, 2024

Beware!! Top Android VPN’s with 500 Million+ Installs Pushing Adware to Android Users

The researcher discovered a four most popular VPN for Android that installed over 500 million users committing ad fraud and pushing unusual ads in users device to generate revenue.

The four most popular Android VPN’s are HotSpot VPN, Free VPN Master, Secure VPN, CM SecurityApplock AntiVirus that are pushing the pop up ads even when the apps are running in the device background and also generates frequent HTTP request which overheats the phone and drain battery.

There are several adware incidents reported in the past few months, and it’s rapidly growing to exclusively target the Android users to generate millions of dollars revenue.

VPN products are used by hundreds of millions of users around the globe to ensure users privacy while roaming on the internet. At the same time, some VPN companies that are listed above are taking advantage of the user’s device accessibility and gain more fraudulent benefits.

A Total of 500,000,000+ downloads are recorded in Play Store. All these 4 apps contain a code that indicates how ad frauds are usually behaving. There is no surprise that the app developers are from China.

Adware Behavior of 4 VPN Apps

Hotspot VPN 

A quite famous VPN with the name of Hotspot VPN – Free Unlimited Fast Proxy VPN caught for using the advertisement API from Google with Identified packages and code which “indicated adware” during the analysis that “they” can show advertisements anytime it wants.

During its malicious behavior, it was accessing the various websites as following.

  • adlog.flurry.com
  • ads.mopub.com
  • conf.daydayup.today
  • doc.app.unitemagic.com
  • fv.app.unitemagic.com
  • play.google.com
  • www.example.com
  • www.facebook.com
  • www.google.com
  • www.yahoo.com
  • adlog.flurry.com
  • csi.gstatic.com/csi
  • imasdk.googleapis.com
  • pagead2.googlesyndication.com
  • twitter.com
  • www.mopub.com

It was filling the complete screen of the phone even when the application was running in the background.

Free VPN Master 

This VPN is advertised with the name of Unlimited Free & Super VPN Proxy. It aggressively pops up the ads over the various apps including Whatsapp, chrome, and more.

According to Andy Michael from VPN Testing,  slight modifications in the name of packages in order to get a different hash for both apks due to the fact that once they were reversed they had the same code and were obfuscated with the same tool. 

Secure VPN

This VPN advertised with the name of Unlimited Free & Super VPN Proxy and it aggressively pop up the apps over the various apps including Whatsapp, chrome, and more.

Researchers found the list of classes that manage the process of getting and showing ads which considers events, the render of the Ad, the request and how to show the Ad.

Security Master by Cheetah Mobile

With the name of App Lock & AntiVirus, the VPN Security Master is prompt the unwanted ad even if the app working in background and trick user to click on it to generate revenue.

VPN Security Master is promoting ads that were found from ad services such as AirBnB, Facebook GitHub, Google, unity3d, and others.

You can find the complete analysis here.

“This application takes it a step further. Instead of constantly showing the ads the app leverages its enormous user base and intrudes less often and randomly (See figure 2. byte code). It uses a more sophisticated approach by popping up the app instead and showing the ads immediately after you try to get back to the home screen.” Andy concluded.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

How to Analyse .NET Malware? – Reverse Engineering Snake Keylogger

Utilizing sandbox analysis for behavioral, network, and process examination provides a foundation for reverse...

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles