{"id":5592,"date":"2019-11-20T12:16:06","date_gmt":"2019-11-20T04:16:06","guid":{"rendered":"https:\/\/version-2.com\/?p=5592"},"modified":"2020-11-04T13:23:12","modified_gmt":"2020-11-04T05:23:12","slug":"tracking-down-the-developer-of-android-adware-affecting-millions-of-users","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","title":{"rendered":"Tracking down the developer of Android adware affecting millions of users"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"5592\" class=\"elementor elementor-5592\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-182fb5b6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"182fb5b6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;fa2c16c&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-21a1fb0d\" data-id=\"21a1fb0d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b7aa071 elementor-widget elementor-widget-text-editor\" data-id=\"4b7aa071\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div><p><span style=\"font-size: small;\">We detected a large adware campaign running for about a year, with the involved apps installed eight million times from Google Play alone.We identified 42 apps on Google Play as belonging to the campaign, which had been running since July 2018. Of those, 21 were still available at the time of discovery. We reported the apps to the Google security team and they were swiftly removed. However, the apps are still available in third-party app stores. ESET detects this adware, collectively, as Android\/AdDisplay.Ashas.<\/span><\/p><div id=\"attachment_130779\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130779\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1.png 1031w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1-150x150.png 150w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1-298x300.png 298w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1-768x773.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-1-1-1017x1024.png 1017w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 1. Apps of the Android\/AdDisplay.Ashas family reported to Google by ESET<\/i><\/span><\/p><\/div><div id=\"attachment_130780\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 510px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130780\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 510px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-570x1024.png\" sizes=\"(max-width: 500px) 100vw, 500px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-570x1024.png 570w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-167x300.png 167w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2-768x1381.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-2.png 1068w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 2. The most popular member of the Android\/AdDisplay.Ashas family on Google Play was \u201cVideo downloader master\u201d with over five million downloads<\/i><\/span><\/p><\/div><h2><strong><span style=\"font-size: medium;\">Ashas functionality<\/span><\/strong><\/h2><p><span style=\"font-size: small;\">All the apps provide the functionality they promise, besides working as adware. The adware functionality is the same in all the apps we analyzed. [Note: The analysis of the functionality below describes a single app, but applies to all apps of the Android\/AdDisplay.Ashas family.]<\/span><\/p><p><span style=\"font-size: small;\">Once launched, the app starts to communicate with its C&amp;C server (whose IP address is base64-encoded in the app). It sends \u201chome\u201d key data about the affected device: device type, OS version, language, number of installed apps, free storage space, battery status, whether the device is rooted and\u00a0<em style=\"box-sizing: border-box;\">Developer mode<\/em>\u00a0enabled, and whether Facebook and FB Messenger are installed.<\/span><\/p><div id=\"attachment_130781\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130781\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-300x83.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-300x83.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-768x212.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3-1024x283.png 1024w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-3.png 1239w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 3. Sending information about the affected device<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">The app receives configuration data from the C&amp;C server, needed for displaying ads, and for stealth and resilience.<\/span><\/p><div id=\"attachment_130782\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 709px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130782\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 709px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-300x93.png\" sizes=\"(max-width: 699px) 100vw, 699px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-300x93.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-768x238.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4-1024x318.png 1024w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-4.png 1243w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 4. Configuration file received from the C&amp;C server<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">As for stealth and resilience, the attacker uses a number of tricks.<\/span><\/p><p><span style=\"font-size: small;\">First, the malicious app tries to determine whether it is being tested by the Google Play security mechanism. For this purpose, the app receives from the C&amp;C server the\u00a0<em style=\"box-sizing: border-box;\">isGoogleIp<\/em>\u00a0flag, which indicates whether the IP address of the affected device falls within the range of known IP addresses for Google servers. If the server returns this flag as positive, the app will not trigger the adware payload.<\/span><\/p><p><span style=\"font-size: small;\">Second, the app can set a custom delay between displaying ads. The samples we have seen had their configuration set to delay displaying the first ad by 24 minutes after the device unlocks. This delay means that a typical testing procedure, which takes less than 10 minutes, will not detect any unwanted behavior. Also, the longer the delay, the lower the risk of the user associating the unwanted ads with a particular app.<\/span><\/p><p><span style=\"font-size: small;\">Third, based on the server response, the app can also hide its icon and create a shortcut instead. If a typical user tries to get rid of the malicious app, chances are that only the shortcut ends up getting removed. The app then continues to run in the background without the user\u2019s knowledge. This stealth technique has been gaining popularity among adware-related threats distributed via Google Play.<\/span><\/p><div id=\"attachment_130783\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130783\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5-300x53.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5-300x53.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5-768x135.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-5.png 821w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 5. Time delay to postpone displaying ads implemented by the adware<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Once the malicious app receives its configuration data, the affected device is ready to display ads as per the attacker\u2019s choice; each ad is displayed as a full screen activity. If the user wants to check which app is responsible for the ad being displayed, by hitting the \u201cRecent apps\u201d button, another trick is used: the app displays a Facebook or Google icon, as seen in Figure 6. The adware mimics these two apps to look legitimate and avoid suspicion \u2013 and thus stay on the affected device for as long as possible.<\/span><\/p><div id=\"attachment_130787\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130787\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-300x266.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-300x266.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-768x682.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-1024x909.png 1024w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-87x77.png 87w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-60x53.png 60w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab-85x75.png 85w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-6ab.png 1294w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 6. The adware activity impersonates Facebook (left). If the user long-presses the icon, the name of the app responsible for the activity is revealed (right).<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Finally, the Ashas adware family has its code hidden under the\u00a0<em style=\"box-sizing: border-box;\">com.google.xxx<\/em>\u00a0package name. This trick \u2013 posing as a part of a legitimate Google service \u2013 may help avoid scrutiny. Some detection mechanisms and sandboxes may whitelist such package names, in an effort to prevent wasting resources.<\/span><\/p><div id=\"attachment_130770\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 259px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130770 size-full\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 259px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7.png\" sizes=\"(max-width: 249px) 100vw, 249px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7.png 249w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-7-147x300.png 147w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 7. Malicious code hidden in a package named \u201ccom.google\u201d<\/i><\/span><\/p><\/div><h2><span style=\"font-size: medium;\">Hunting down the developer<\/span><\/h2><p><span style=\"font-size: small;\">Using open-source information, we tracked down the developer of the adware, who we also identified as the campaign\u2019s operator and owner of the C&amp;C server. In the following paragraphs, we outline our\u00a0 efforts to discover other applications from the same developer and protect our users from it.<\/span><\/p><p><span style=\"font-size: small;\">First, based on information that is associated with the registered C&amp;C domain, we identified the name of the registrant, along with further data like country and email address, as seen in Figure 8.<\/span><\/p><div id=\"attachment_130771\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 663px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130771 size-full\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 663px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8.png\" sizes=\"(max-width: 653px) 100vw, 653px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8.png 653w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8-300x209.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-8-623x432.png 623w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 8. Information about the C&amp;C domain used by the Ashas adware<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Knowing that the information provided to a domain registrar might be fake, we continued our search. The email address and country information drove us to a list of students attending a class at a Vietnamese university \u2013 corroborating the existence of the person under whose name the domain was registered.<\/span><\/p><div id=\"attachment_130772\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130772\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-300x180.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-300x180.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-768x461.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9-1024x614.png 1024w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-9.png 1144w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 9. A university class student list including the C&amp;C domain registrant<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Due to poor privacy practices on the part of our culprit\u2019s university, we now know his date of birth (probably: he seemingly used his birth year as part of his Gmail address, as further partial confirmation), we know that he was a student and what university he attended. We were also able to confirm that the phone number he provided to the domain registrar was genuine. Moreover, we retrieved his University ID; a quick googling showed some of his exam grades. However, his study results are out of the scope of our research.<\/span><\/p><p><span style=\"font-size: small;\">Based on our culprit\u2019s email address, we were able to find his GitHub repository. His repository proves that he is indeed an Android developer, but it contained no publicly available code of the Ashas adware at the time of writing of this blogpost.<\/span><\/p><p><span style=\"font-size: small;\">However, a simple Google search for the adware package name returned a \u201cTestDelete\u201d project that had been available in his repository at some point<\/span><\/p><p><span style=\"font-size: small;\">The malicious developer also has apps in Apple\u2019s App Store. Some of them are iOS versions of the ones removed from Google Play, but none contain adware functionality.<\/span><\/p><div id=\"attachment_130773\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130773\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10-300x218.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10-300x218.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10-768x559.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-10.png 913w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 10. The malicious developer\u2019s apps published on the App Store which don\u2019t contain the Ashas adware<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Searching further for the malicious developer\u2019s activities, we also discovered his Youtube channel propagating the Ashas adware and his other projects. As for the Ashas family, one of the associated promotional videos, \u201cHead Soccer World Champion 2018 \u2013 Android, ios\u201d was viewed almost three million times and two others reached hundreds of thousands of views, as seen in Figure 11.<\/span><\/p><div id=\"attachment_130774\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130774\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11-300x290.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11-300x290.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11-768x741.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-11.png 866w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 11. YouTube channel of the malicious developer<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">His YouTube channel provided us with another valuable piece of information: he himself features in a video tutorial for one of his other projects. Thanks to that project, we were able to extract his Facebook profile \u2013 which lists his studies at the aforementioned university.<\/span><\/p><div id=\"attachment_130775\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 709px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130775\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 709px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12-300x138.png\" sizes=\"(max-width: 699px) 100vw, 699px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12-300x138.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12-768x354.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-12.png 903w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 12. Facebook profile of the C&amp;C domain registrar (cover picture and profile picture edited out)<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Linked on the malicious developer\u2019s Facebook profile, we discovered a Facebook page,\u00a0<em style=\"box-sizing: border-box;\">Minigameshouse<\/em>, and an associated domain, minigameshouse[.]net. This domain is similar to the one the malware author used for his adware C&amp;C communication, minigameshouse[.]us.<\/span><\/p><p><span style=\"font-size: small;\">Checking this\u00a0<em style=\"box-sizing: border-box;\">Minigameshouse<\/em>\u00a0page further indicates that this person is indeed the owner of the minigameshouse[.]us domain: the phone number registered with this domain is the same as the phone number appearing on the Facebook page.<\/span><\/p><div id=\"attachment_130776\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130776\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13-247x300.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13-247x300.png 247w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13-768x932.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13-844x1024.png 844w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-13.png 1022w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 13. Facebook page managed by the C&amp;C domain registrant uses the same base domain name (minigameshouse) and phone number as the registered malicious C&amp;C used by the Ashas adware<\/i><\/span><\/p><\/div><p><span style=\"font-size: small;\">Of interest is that on the\u00a0<em style=\"box-sizing: border-box;\">Minigameshouse<\/em>\u00a0Facebook page, the malicious developer promotes a slew of games beyond the Ashas family for download on both Google Play and the App Store. However, all of those have been removed from Google Play \u2013 despite the fact that some of them didn\u2019t contain any adware functionality.<\/span><\/p><p><span style=\"font-size: small;\">On top of all this, one of the malicious developer\u2019s YouTube videos \u2013 a tutorial on developing an \u201cInstant Game\u201d for Facebook \u2013 serves as an example of operational security completely ignored. We were able to see that his recently visited web sites were Google Play pages belonging to apps containing the Ashas adware. He also used his email account to log into various services in the video, which identifies him as the adware domain owner, beyond any doubt.<\/span><\/p><p><span style=\"font-size: small;\">Thanks to the video, we were even able to identify three further apps that contained adware functionality and were available on Google Play.<\/span><\/p><div id=\"attachment_130777\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 709px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130777\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 709px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14-300x259.png\" sizes=\"(max-width: 699px) 100vw, 699px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14-300x259.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14-768x662.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14-1024x883.png 1024w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14-60x53.png 60w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-14.png 1428w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 14. Screenshots from this developer\u2019s YouTube video shows history of checking Ashas adware on Google Play<\/i><\/span><\/p><\/div><h2><span style=\"font-size: medium;\">ESET telemetry<\/span><\/h2><div id=\"attachment_130778\" class=\"wp-caption aligncenter\" style=\"box-sizing: border-box; margin: 0px auto 60px; padding: 0px; max-width: 100%; width: 710px; color: #424d56; font-family: Fedra,;\"><p><a class=\"fancybox\" style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15.png\" data-fancybox=\"single-post-fancybox\"><span style=\"font-size: small;\"><img decoding=\"async\" class=\"wp-image-130778\" style=\"box-sizing: border-box; border: 0px; vertical-align: middle; max-width: 100%; height: auto; width: 710px;\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15-300x220.png\" sizes=\"(max-width: 700px) 100vw, 700px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15-300x220.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15-768x564.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/10\/Figure-15.png 918w\" alt=\"\" \/><\/span><\/a><\/p><p class=\"wp-caption-text\" style=\"box-sizing: border-box; margin: 0px; line-height: 22px; background: #0096a1; color: #ffffff; padding: 10px 30px; max-width: 100%; text-align: center;\"><span style=\"font-size: small;\"><i style=\"box-sizing: border-box;\">Figure 15. ESET detections of Android\/AdDisplay.Ashas on Android devices by country<\/i><\/span><\/p><\/div><h2><span style=\"font-size: medium;\">Is adware harmful?<\/span><\/h2><p><span style=\"font-size: small;\">Because the real nature of apps containing adware is usually hidden to the user, these apps and their developers should be considered untrustworthy. When installed on a device, apps containing adware may, among other things:<\/span><\/p><ul style=\"box-sizing: border-box; margin: 0px 0px 60px; padding: 0px; list-style-position: outside; color: #424d56; font-family: Fedra,;\"><li style=\"box-sizing: border-box; margin-bottom: 32px; padding-left: 40px; background: url(;\"><span style=\"font-size: small;\">Annoy users with intrusive advertisements, including scam ads<\/span><\/li><li style=\"box-sizing: border-box; margin-bottom: 32px; padding-left: 40px; background: url(;\"><span style=\"font-size: small;\">Waste the device\u2019s battery resources<\/span><\/li><li style=\"box-sizing: border-box; margin-bottom: 32px; padding-left: 40px; background: url(;\"><span style=\"font-size: small;\">Generate increased network traffic<\/span><\/li><li style=\"box-sizing: border-box; margin-bottom: 32px; padding-left: 40px; background: url(;\"><span style=\"font-size: small;\">Gather users\u2019 personal information<\/span><\/li><li style=\"box-sizing: border-box; margin-bottom: 32px; padding-left: 40px; background: url(;\"><span style=\"font-size: small;\">Hide their presence on the affected device to achieve persistence<\/span><\/li><li style=\"box-sizing: border-box; margin-bottom: 32px; padding-left: 40px; background: url(;\"><span style=\"font-size: small;\">Generate revenue for their operator without any user interaction<\/span><\/li><\/ul><h2><span style=\"font-size: medium;\">Conclusion<\/span><\/h2><p><span style=\"font-size: small;\">Based solely on open source intelligence, we were able to trace the developer of the Ashas adware and establish his identity and discover additional related adware-infected apps. Seeing that the developer did not take any measures to protect his identity, it seems likely that his intentions weren\u2019t dishonest at first \u2013 and this is also supported by the fact that not all his published apps contained unwanted ads.<\/span><\/p><p><span style=\"font-size: small;\">At some point in his Google Play \u201ccareer\u201d, he apparently decided to increase his ad revenue by implementing adware functionality in his apps\u2019 code. The various stealth and resilience techniques implemented in the adware show us that the culprit was aware of the malicious nature of the added functionality and attempted to keep it hidden.<\/span><\/p><p><span style=\"font-size: small;\">Sneaking unwanted or harmful functionality into popular, benign apps is a common practice among \u201cbad\u201d developers, and we are committed to tracking down such apps. We report them to Google and take other steps to disrupt malicious campaigns we discover. Last but not least, we publish our findings to help Android users protect themselves.<\/span><\/p><h2><span style=\"font-size: small;\">Indicators of Compromise (IoCs)<\/span><\/h2><table id=\"tablepress-762\" class=\"tablepress tablepress-id-762\" style=\"box-sizing: border-box; border-collapse: collapse; border-spacing: 0px; margin-bottom: 20px; color: #424d56; font-family: Fedra,;\"><thead style=\"box-sizing: border-box;\"><tr class=\"row-1 odd\" style=\"box-sizing: border-box;\"><th class=\"column-1\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">Package name<\/span><\/th><th class=\"column-2\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">Hash<\/span><\/th><th class=\"column-3\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">Installs<\/span><\/th><\/tr><\/thead><tbody class=\"row-hover\" style=\"box-sizing: border-box;\"><tr class=\"row-2 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.ngocph.masterfree<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">c1c958afa12a4fceb595539c6d208e6b103415d7<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000,000+<\/span><\/td><\/tr><tr class=\"row-3 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.mghstudio.ringtonemaker<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">7a8640d4a766c3e4c4707f038c12f30ad7e21876<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">500,000+<\/span><\/td><\/tr><tr class=\"row-4 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.hunghh.instadownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">8421f9f25dd30766f864490c26766d381b89dbee<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">500,000+<\/span><\/td><\/tr><tr class=\"row-5 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.chungit.tank1990<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">237f9bfe204e857abb51db15d6092d350ad3eb01<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">500,000+<\/span><\/td><\/tr><tr class=\"row-6 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.video.downloadmasterfree<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">43fea80444befe79b55e1f05d980261318472dff<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-7 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.massapp.instadownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1382c2990bdce7d0aa081336214b78a06fceef62<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-8 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.chungit.tankbattle<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1630b926c1732ca0bb2f1150ad491e19030bcbf2<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-9 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.chungit.basketball<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">188ca2d47e1fe777c6e9223e6f0f487cb5e98f2d<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-10 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.applecat.worldchampion2018<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">502a1d6ab73d0aaa4d7821d6568833028b6595ec<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-11 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">org.minigamehouse.photoalbum<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">a8e02fbd37d0787ee28d444272d72b894041003a<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-12 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.mngh.tuanvn.fbvideodownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">035624f9ac5f76cc38707f796457a34ec2a97946<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-13 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.v2social.socialdownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">2b84fb67519487d676844e5744d8d3d1c935c4b7<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-14 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.hikeforig.hashtag<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">8ed42a6bcb14396563bb2475528d708c368da316<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-15 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.chungit.heroesjump<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">c72e92e675afceca23bbe77008d921195114700c<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-16 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.mp4.video.downloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">61E2C86199B2D94ABF2F7508300E3DB44AE1C6F1<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100,000+<\/span><\/td><\/tr><tr class=\"row-17 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.videotomp4.downloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1f54e35729a5409628511b9bf6503863e9353ec9<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">50,000+<\/span><\/td><\/tr><tr class=\"row-18 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">boxs.puzzles.Puzzlebox<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">b084a07fdfd1db25354ad3afea6fa7af497fb7dc<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">50,000+<\/span><\/td><\/tr><tr class=\"row-19 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.intatwitfb.download.videodownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">8d5ef663c32c1dbcdd5cd7af14674a02fed30467<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">50,000+<\/span><\/td><\/tr><tr class=\"row-20 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.doscreenrecorder.screenrecorder<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">e7da1b95e5ddfd2ac71587ad3f95b2bb5c0f365d<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">50,000+<\/span><\/td><\/tr><tr class=\"row-21 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.toptools.allvideodownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">32E476EA431C6F0995C75ACC5980BDBEF07C8F7F<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">50,000+<\/span><\/td><\/tr><tr class=\"row-22 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.top1.videodownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">a24529933f57aa46ee5a9fd3c3f7234a1642fe17<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-23 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.santastudio.headsoccer2<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">86d48c25d24842bac634c2bd75dbf721bcf4e2ea<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-24 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.ringtonemakerpro.ringtonemakerapp2019<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5ce9f25dc32ac8b00b9abc3754202e96ef7d66d9<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-25 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.hugofq.solucionariodebaldor<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">3bb546880d93e9743ac99ad4295ccaf982920260<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-26 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.anit.bouncingball<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">6e93a24fb64d2f6db2095bb17afa12c34b2c8452<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-27 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.dktools.liteforfb<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">7bc079b1d01686d974888aa5398d6de54fd9d116<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-28 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">net.radiogroup.tvnradio<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">ba29f0b4ad14b3d77956ae70d812eae6ac761bee<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-29 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.anit.bouncingball<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">6E93A24FB64D2F6DB2095BB17AFA12C34B2C8452<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-30 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.floating.tube.bymuicv<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">6A57D380CDDCD4726ED2CF0E98156BA404112A53<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">10,000+<\/span><\/td><\/tr><tr class=\"row-31 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">org.cocos2dx.SpiderSolitaireGames<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">adbb603195c1cc33f8317ba9f05ae9b74759e75b<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-32 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">games.puzzle.crosssum<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">31088dc35a864158205e89403e1fb46ef6c2c3cd<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-33 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">dots.yellow.craft<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">413ce03236d3604c6c15fc8d1ec3c9887633396c<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-34 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.tvngroup.ankina.reminderWater<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5205a5d78b58a178c389cd1a7b6651fe5eb7eb09<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-35 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.hdevs.ringtonemaker2019<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">ba5a4220d30579195a83ddc4c0897eec9df59cb7<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-36 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.carlosapps.solucionariodebaldor<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">741a95c34d3ad817582d27783551b5c85c4c605b<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-37 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.mngh1.flatmusic<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">32353fae3082eaeedd6c56bb90836c89893dc42c<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">5,000+<\/span><\/td><\/tr><tr class=\"row-38 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.tvn.app.smartnote<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">ddf1f864325b76bc7c0a7cfa452562fe0fd41351<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1,000+<\/span><\/td><\/tr><tr class=\"row-39 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.thrtop.alldownloader<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">f46ef932a5f8e946a274961d5bdd789194bd2a7d<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1,000+<\/span><\/td><\/tr><tr class=\"row-40 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.anthu91.soccercard<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">0913a34436d1a7fcd9b6599fba64102352ef2a4a<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1,000+<\/span><\/td><\/tr><tr class=\"row-41 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.hugofq.wismichudosmildiecisiete<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">4715bd777d0e76ca954685eb32dc4d16e609824f<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1,000+<\/span><\/td><\/tr><tr class=\"row-42 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.gamebasketball.basketballperfectshot<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">e97133aaf7d4bf90f93fefb405cb71a287790839<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1,000+<\/span><\/td><\/tr><tr class=\"row-43 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.nteam.solitairefree<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">3095f0f99300c04f5ba877f87ab86636129769b1<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">100+<\/span><\/td><\/tr><tr class=\"row-44 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">com.instafollowers.hiketop<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">3a14407c3a8ef54f9cba8f61a271ab94013340f8<\/span><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">1+<\/span><\/td><\/tr><\/tbody><\/table><h3 style=\"box-sizing: border-box; font-family: Fedra,;\"><span style=\"font-size: small;\">C&amp;C server<\/span><br \/><span style=\"font-size: small;\"><br \/><a href=\"http:\/\/35.198.197[.]119:8080\" rel=\"nofollow\">http:\/\/35.198.197[.]119:8080<\/a><\/span><br \/><span style=\"font-size: small;\"><br \/>MITRE ATT&amp;CK techniques<\/span><\/h3><table id=\"tablepress-763\" class=\"tablepress tablepress-id-763\" style=\"box-sizing: border-box; border-collapse: collapse; border-spacing: 0px; margin-bottom: 20px; color: #424d56; font-family: Fedra,;\"><thead style=\"box-sizing: border-box;\"><tr class=\"row-1 odd\" style=\"box-sizing: border-box;\"><th class=\"column-1\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">Tactic<\/span><\/th><th class=\"column-2\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">ID<\/span><\/th><th class=\"column-3\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">Name<\/span><\/th><th class=\"column-4\" style=\"box-sizing: border-box; padding: 25px 15px; text-align: left; background: #f4f5f4;\"><span style=\"font-size: small;\">Description<\/span><\/th><\/tr><\/thead><tbody class=\"row-hover\" style=\"box-sizing: border-box;\"><tr class=\"row-2 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">Initial Access<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><a style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/attack.mitre.org\/techniques\/T1475\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: small;\">T1475<\/span><\/a><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">Deliver Malicious App via Authorized App Store<\/span><\/td><td class=\"column-4\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">The malware impersonates legitimate services on Google Play<\/span><\/td><\/tr><tr class=\"row-3 odd\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">Persistence<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><a style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/attack.mitre.org\/techniques\/T1402\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: small;\">T1402<\/span><\/a><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">App Auto-Start at Device Boot<\/span><\/td><td class=\"column-4\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">An Android application can listen for the BOOT_COMPLETED broadcast, ensuring that the app&#8217;s functionality will be activated every time the device starts<\/span><\/td><\/tr><tr class=\"row-4 even\" style=\"box-sizing: border-box;\"><td class=\"column-1\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">Impact<\/span><\/td><td class=\"column-2\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><a style=\"box-sizing: border-box; background-color: transparent; color: #0096a1; text-decoration-line: none;\" href=\"https:\/\/attack.mitre.org\/techniques\/T1472\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size: small;\">T1472<\/span><\/a><\/td><td class=\"column-3\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">Generate Fraudulent Advertising Revenue<\/span><\/td><td class=\"column-4\" style=\"box-sizing: border-box; padding: 15px; transition: all 0.3s ease-in-out 0s; border-bottom: 2px solid #f4f5f4; font-size: 15px;\"><span style=\"font-size: small;\">Generates revenue by automatically displaying ads<\/span><\/td><\/tr><\/tbody><\/table><p><span style=\"font-size: small;\"><em style=\"box-sizing: border-box;\">Kudos to @jaymin9687 for bringing the problem of unwanted ads in the \u201cVideo downloader master\u201d app to our attention.<\/em><\/span><span style=\"font-family: Arial, Verdana, sans-serif; font-size: 12px;\">\u00a0<\/span><span style=\"font-family: Arial, Verdana, sans-serif; font-size: 12px;\">\u00a0<\/span><\/p><p><span style=\"font-family: Arial, Verdana, sans-serif; font-size: 12px;\">\u00a0<\/span><\/p><p><span style=\"font-family: Arial, Verdana, sans-serif; font-size: 12px;\">\u00a0<\/span><\/p><\/div><div style=\"text-align: start;\"><p style=\"font-size: 12px; font-weight: normal; margin: 12px 0px;\">\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a88858 elementor-widget elementor-widget-shortcode\" data-id=\"7a88858\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>We detected a large adware campaign running for about a [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":5593,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,40,61,100],"tags":[41,103],"class_list":["post-5592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-v2","category-eset","category-press-release","category-year2019","tag-eset","tag-android"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tracking down the developer of Android adware affecting millions of users - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tracking down the developer of Android adware affecting millions of users - Version 2\" \/>\n<meta property=\"og:description\" content=\"We detected a large adware campaign running for about a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-20T04:16:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-04T05:23:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png?fit=1031%2C1038&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1031\" \/>\n\t<meta property=\"og:image:height\" content=\"1038\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Tracking down the developer of Android adware affecting millions of users\",\"datePublished\":\"2019-11-20T04:16:06+00:00\",\"dateModified\":\"2020-11-04T05:23:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\"},\"wordCount\":2377,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-1.png\",\"keywords\":[\"ESET\",\"Android\"],\"articleSection\":[\"Version 2 Limited\",\"ESET\",\"Press Release\",\"2019\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\",\"name\":\"Tracking down the developer of Android adware affecting millions of users - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-1.png\",\"datePublished\":\"2019-11-20T04:16:06+00:00\",\"dateModified\":\"2020-11-04T05:23:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#primaryimage\",\"url\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-1.png\",\"contentUrl\":\"https:\\\/\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-1.png\",\"width\":1031,\"height\":1038},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2019\\\/11\\\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tracking down the developer of Android adware affecting millions of users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tracking down the developer of Android adware affecting millions of users - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","og_locale":"en_US","og_type":"article","og_title":"Tracking down the developer of Android adware affecting millions of users - Version 2","og_description":"We detected a large adware campaign running for about a [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","og_site_name":"Version 2","article_published_time":"2019-11-20T04:16:06+00:00","article_modified_time":"2020-11-04T05:23:12+00:00","og_image":[{"width":1031,"height":1038,"url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png?fit=1031%2C1038&ssl=1","type":"image\/png"}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Tracking down the developer of Android adware affecting millions of users","datePublished":"2019-11-20T04:16:06+00:00","dateModified":"2020-11-04T05:23:12+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/"},"wordCount":2377,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png","keywords":["ESET","Android"],"articleSection":["Version 2 Limited","ESET","Press Release","2019"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","url":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/","name":"Tracking down the developer of Android adware affecting millions of users - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage"},"thumbnailUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png","datePublished":"2019-11-20T04:16:06+00:00","dateModified":"2020-11-04T05:23:12+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#primaryimage","url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png","contentUrl":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png","width":1031,"height":1038},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/zh\/2019\/11\/tracking-down-the-developer-of-android-adware-affecting-millions-of-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Tracking down the developer of Android adware affecting millions of users"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/Figure-1-1.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-1sc","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=5592"}],"version-history":[{"count":9,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5592\/revisions"}],"predecessor-version":[{"id":18648,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/5592\/revisions\/18648"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media\/5593"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=5592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=5592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=5592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}