Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware - Security Boulevard

SBN Fake Users Rave but Real Users Rant as Apps on Google Play Deal Aggressive Adware

Bitdefender researchers recently stumbled across 13 Google Play applications packing aggressive ads and potentially using over 1,000 fake reviews to gain a cumulative download count of over half of million.

While fake online reviews may be punishable by the FTC with millions of dollars, it’s interesting that, while some of the analyzed apps only got a dozen or so reviews, one in particular has even passed 1,000 reviews. Ironically, the developer behind the apps seems to be taking an interest in negative and very emotional reviews of three stars and below, even though many of the answers follow the same template. Taking things to a new level, some of the five-star reviews even collect over 100 “Helpful” ratings, potentially from the same fake accounts – spam bot- network.

It may not be the first time security researchers stumble across Google Play applications with aggressive adware that manage to trick their way into Google’s app playground, but this time the developer behind the applications seems to have placed more focus on building positive fake reviews to draw downloads. Apps bundled with aggressive adware are often spotted by users and end up collecting tons of negative reviews before being booted out.

The below analysis performed by Bitdefender researchers on the 13 apps found in Google Play mostly focuses on the capabilities the aggressive adware features as well as finding forensic evidence that potentially ties them all to a single developer. The analysis also revealed that the adware SDK packs a privacy-intrusive permission that allows the apps to read all notifications. This could enable the developer(s) to collect contact details, text messages, and OTPs that are used to pass MFA. Although the apps analyzed did not trigger the permission, the code is present in some of the analyzed samples.

Key Findings:

  • New aggressive adware family, also found in 13 Google Play apps
  • Use of fake reviews and ratings to attract hundreds of thousands of downloads
  • Adware SDK packs privacy-intrusive permission to read all notifications
  • Potentially same developer behind all investigated Google Play apps

Down the Rabbit Hole

A previously undiscovered yet highly aggressive adware campaign has recently been found in applications still available in the Google Store and other markets.

The apps’ categories are a mix of common utility apps, ranging from music and video players to file downloaders and social media aggregators.

While ads are not inherently bad, and give the app authors a way to make income without requesting a payment from everyone who uses their apps, when the developers go overboard with their ad usage it becomes inconvenient to the user, eventually surpassing the worth of the application in time and annoyance.

Whilst the ratings are generally good, between 3 and 4.5 stars on Google Play’s 5-star rating system, something seems fishy with a quick look at the reviews:

A high number of short, general and mostly 5-star reviews usually indicates that the app developers might be using a fake review-generation system. While this is only speculation, the act of faking reviews is punishable by the FTC, and fines can reach millions of dollars. This is a known problem for Google Play and these apps would be neither the first nor the last apps to increase their chances of getting popular more quickly and easily. After all, if most reviews are great, it must mean the app is worth it:

A quick look at the reviews of users who actually used the application before leaving a comment reflects its real behavior much better:

Applications and connections

The applications are the following:

Package nameApplication nameInstalls
com.downloader.getvideofastssVideo Downloader – Download Social Platform Video100,000+
com.anymailFull Email App – Fast Email access for all Mail100,000+
com.savers.instaInsSaver – video & image downloader for instagram100,000+
com.getVideo.mediagetallFast Downloader – Download social videos100,000+
com.launcherj.quickMessenger for all Social apps – New Messages50,000+
com.downloadmanager.filemanagerFile download manager50,000+
com.musics.videos.aaplayersMusic Video Player – All format player10,000+
com.media.musicsvideos.playersMedia Player All Format – HD Video Player10,000+
com.privacymsger.socialNew Messenger for all messaging & social app5,000+
com.satatusdownload.saverstatusStatus Saver1,000+
launchserfor.appsQuick Launcher For Apps1,000+
com.parallaxcolor.fourdx4D Parallax Live Wallpaper – 4K Backgrounds HD1,000+
com.wallpaperlive.fourd4D Parallax Wallpaper HD – Color live background100+

The applications are published by nine separate developers although we believe there is in fact only one developer due to several connections between the samples. One presumption is that this is done to avoid all of them being taken down if any fraudulent or unwanted behavior from any one developer is found.

Developer NameEmail Address
circRodg.57.543[email protected][.]com
James Tange[email protected][.]com
Socialmessengerapp[email protected][.]com
Laverneishipwreckm115[email protected][.]com
luis gallegos[email protected][.]com
trumpeter.wiy6789[email protected][.]com
Adriana Duleva[email protected][.]com
Steps Pedometer:Steps App, Step Tracker[email protected][.]com
thayrelqyckcSocial[email protected][.]com

A strong indicator that these applications are linked is that most of them have the same distinctly unique pattern of words used for the certificate details with which they are signed. Certificate details respect the following format:

Certificate detail fieldApplications certificate details
Country NameUS
State, Locality<Random US state>
Organization, Organizational Unit, Common NameCorpLtd<Timestamp of appriximate creation>Ltd

Example applications from different developers:

ApplicationApplications certificate details
Status SaverC=US, ST=New York, L=New York, O=Corp1584509501892Ltd, OU=Corp1584509501892Ltd, CN=Corp1584509501892Ltd
Quick Launcher For AppsC=US, ST=Florida, L=Florida, O=Corp1576154534422Ltd, OU=Corp1576154534422Ltd, CN=Corp1576154534422Ltd
Fast Downloader – Download social videosC=US, ST=Florida, L=Florida, O=Corp1576828043681Ltd, OU=Corp1576828043681Ltd, CN=Corp1576828043681Ltd

Some light connections could be concluded from the email addresses for support contact and the privacy policies. All the privacy policies are hosted on sites.google.com and we can observe a mild pattern in the email addresses used..

From a code structural point of view, the applications have the same distinct, heavy code obfuscation and string encryption mechanism. This obfuscation is applied both to the normal code of the application and to the adware component.

The adware component, present in all apps in some form or another, focuses on displaying ads from Google and Facebook. We say in some form or another to indicate that the authors are still developing it and adding new features to it. We have seen several variations in the wild.

Another similarity is in the user interface of the apps. Many of them share the same visual characteristics and structure, for example:

com.media.musicsvideos.players com.musics.videos.aaplayers
(developer: luis gallegos) (developer: Laverneishipwreckm115)
com.anymail com.privacymsger.social
(developer: Steps Pedometer:Steps App, Step Tracker) (developer: Socialmessengerapp)


While interacting with the applications, the user will receive a new ad every few taps. Some older versions of the apps didn’t even find the time to remove their testing tags in their rush to get on the market. The type of ads varies from general topics such as shopping and travel to app recommendations, and they come both in banner and full-screen modes.

The advertised functionality of the apps is generally lacking. Basic at best and broken at worst, the apps are of inferior quality, with missing parts in their implementation and occasional crashes.

Code Analysis

Our analysis focused mostly on APK MD5 dcb5b8d8270b4a51a7702fa716ff9bc2 (launchserfor.apps), given that it presented most of the features of the SDK and is one of the versions currently available on the Play Store.

The code is heavily obfuscated, and strings used by the app are encrypted using DES encryption algorithm. Virtually nothing is left as plain information and some of the classes are hidden even in legit packages such as android.support and com.facebook. This started as a technique to protect intellectual information but nowadays it’s often misused as a way to delay analysts and avoid effective detections.

Interestingly, in an initial test version of the adware, we found that the threat actors might have planned to confuse the user by switching the position of the “agree” and “refuse” buttons when prompting for access to notifications (the strings have been decrypted here).

This SDK version (among others) has the code to ask for the permission to read all notifications. This is one of the most sensitive permissions the Android system provides, since notifications can contain any type of data, from contact details, to text messages to OTPs that are used to pass MFA – even banking data in some cases. However, none of the samples we analyzed reach the code to do so as of yet.

If this part of the code wasn’t dead, however, the inconvenience of the user who is the target of too many ads is suddenly one of the lesser problems since, once received, the notifications are promptly sent to the APK’s command and control server: in this case, hxxps://t.lineranalysis.com/api/APClient3/.

The service androidx.media.ckwtik extends the NotificationListenerServices class belonging to the Android SDK. If the app has the required permission, overwriting the onNotificationPosted(StatusBarNotification) method will give it access to the device’s notifications and related information. The analyzed app never reaches the part of the code that requests the permission from the user (probably due to the app still being in development). However, if, or when, it reaches that part, it will use it to leak all the notification data to the server.

Two of the apps currently up on Play Store have this type of functionality implemented, namely com.forasocial.messengers and launchserfor.apps.

Another interesting part of the SDK is where it provides a large support for JavaScript. Besides having a class dedicated to exposing functionality through JavaScript interfaces, it goes so far as having the functionality to execute any script received from the server.

(Some of the strings have been decrypted for readability.)

The app also sends generic information to the server, such as the list of installed applications, the device’s android ID, the app’s package name, the type of network, the sim operator, whether the current app has certain functionalities implemented, logs, timestamps and status checks.

Command and Control


All of the CnCs are under the same registrar, namely the Chinese company Alibaba Cloud Computing.

CnCIP resolved toLocationISP
hxxps://api.instragramvideodownload.top/45.56.121[.]196Texas, USLinode
hxxps://api.supervideoplayer.top/47.89.244[.]237California, USAlibaba
hxxps://api.socialvideodownloader.top/47.90.254[.]44California, USAlibaba
hxxps://api.hdvideoplayer.top/47.252.11[.]196Kansas, USAlibaba
hxxps://api.privatemsg.top/80.245.105[.]93Hong Kong, Hong KongSakura Network
hxxp://api.wallpaper4k.top/172.67.157[.]133California, USCloudflare
hxxp://t.lineranalysis.com/172.105.66[.]146Frankfurt, GermanyLinode
hxxps://api.sportcounter.top/178.79.159[.]197London, UKLinode
hxxps://api.launcherfor.top/104.18.52[.]47California, USCloudflare


While we cannot be certain of the origin of the developer(s), most privacy pages for each developer have their tab title in Chinese (either 首页 -Homepage or住宅 – Home).

Many debug messages (logs) inside the applications are also in the same language (e.g. “因未调用setApplicationContext()初始化, 当前不支持Cookie”) and all of the CnCs are registered in China.


The family seems to be most popular in India, Korea and the US, although we have seen it in the wild in many other countries, too.


Aggressive adware may not be as damaging or as intrusive as malware, but it could affect the overall user experience with the device and even battery performance. Constant popups, redirects and unwanted messages can make for a horrendous app and user experience.

To avoid exposing your device to any online threats, malware, or even aggressive adware, it’s recommended you always use a security solution to prevent these apps from reaching your device and to flag any suspicious behavior. It’s also important to always download apps from official marketplaces and read user reviews carefully before installing any application on your mobile device.

A mobile security solution will also keep you safe from online threats, such as fraud, phishing, or scams gunning for your private and financial data, as well as from malware.

Note: The full list of apps identified throughout this investigation has been reported to Google. At the time of writing, the apps are still available in the Google Play store.

Appendix – Indicators of Compromise

APK MD5 Hashes:

36487995b2065b4c50db0974fed86b6f 0521f9fbbfa412df9b2b7bbe179b94735c45693b45a7bcba9862fad05fa53854 f06b04bc39b8cc6a3d71b7f14436cb451f50aebf88ef1891088a741e7f8710f1 c0e0f9da83321bf7fc342427c11515d38c7d408765ca39ef8df036b5ee2e02a2 c8026f8ae36cdeb19ab0ac88fa19c39c0dc755c930f04d94cc766cc24b22fe86 9cb6249d87fee006c277bfa2cb1f6cff81752036b124ed316f5d40490cab5c33 5f3a4f99c0dc1c5a961b6a7465d3140857973e7a0cd393ba0b78f23cd558b1ab 3b431fb2299304db1dc9ccb6f5fc453b9d5acfcbe4aa035230d257a6932705ff 7b896feb1121e5ce7202ac4871dc14cde0d4b92c2567affb0705af955b9518e1 940f5c8a2a3bd0760ce20365ed0365a97363abef6b9f595e77b5494953bf0d35 a43885932b670d0cb022872c603ec122f19bae00c088333f33c19a516d8d527f 3750e5cfa1695617c4e597891bb4e8097cb00fe0d04899d4227e59d29f3b6410 2bad3244b6506dc5e0faf1e436a5d6a546438d17e70b5165ea11c73766a495e0 28a078d2a500f5bfe58962e1fea1d41bab05e56aa27d070ed1f34409eb0842aa 6f5bf6bf43bf029fb254d2fb782c7a3214550303bb4b268c689bb4293dcee289 941005fc40e55899dd3c553eb1df838871b6dbcf8acc6d6c6cf3166e61f2feaa 57990383fbaf2e49e0880cb100a8fd625ff61232930ec75b376d231bb39423fa a6bdf0db60c64d25bd250b3b4ca737d0526183c16a1005b55ae0e6389a149910 236d3841db80b4d6e1afd50cb92ba715742de75afaeeafaf75b2273fa36bf34c 17bc83ed0eb5ed77bffbae8c4abb3501bc7df772eb37c89b64a72a757f2ca1d5 1f78f59f1c31d819c03bcf8a2cc5cb96ef5b9274e33427103eecfccd82d0dc5b d4d99873da43d32d7a0be2b6811e15ea8dd38018890aeba739c938916e7f3727 7566614c18be0b4c23d2dbb2bc420c0fc1018ae80f622230c5349ce8a8dc2562 cdec7e300cfdb64555a217d8f51d306f8784395fdb7ed648ce152ef1173a53a2 c6cb9e55cadfcb7deb591f3ac0f9d24078f0ee320f66a7a5de5194e7cb873008 148f7508a35dc495f5b2ceaa707e10300903a1b8ed6114aadd83d23a53142ef9 bc57bb1e74e4d0b34d2fcd4b69e4118ab0dc18176ac18fcae18fe61b8a397f44 acc27a14f036bdd47438ea09908fcd692d68ee4649b08776410413370e7964fc 49719467dbcdee0d4d564a4128fabe99eaad6f16e5ae3075f61724f66ce70ed1 80ce85bda2994d6e5c2eb63233a2b79be5df2cdb7a2dcd3f6d0644bc34d6035f 5c9f220fed5f1b1b93d18d9c30d4b2bc2f65925a529cd087dde2a51ba29b16b4 a64ab2b9af4336855b7344c80acbafb32ac54ab36509708b448171395bf50252 fc2586fdb1dc56c509100396ebb5467ff37e23894e8b0d085467742d18c26d46 2ec708356094d19279b448211f89fd617be64c2e869275cf704ad0bd7262796c 82df2839432212a2e682cd8eb73bb2309009c214baba186a002c4be90e8127d8 331021d1fb3d8e2fa7de70823b7b224c15c1e76705f79399276fd634574104df adc1b0765a684c8c00118522631714ddc457219c54f425b4e60e5ac7f2a1d2d3 3647f740aefbdfc97c329ae26c86b63e8f6b7efbb1d3e2f1a0f32ca8fc3aa483 42db70cc7660861991c40860cdf3ffe7e3d6ee9a01ff9f27dd12d33b6a7b66b9 eec3889e812dc733b53bb9b32f33eb313ca64f55b1e5000ce600034cb873054f 8e7d907575414d2ca20f8122d17a958016294f6c77a0aa2c61de46489fcc3417 2f3dcf62ac985031d358b884fd86fbf5b7566506a04cf1effce9359e67df5284 b779509aeb066a972cec186d0e3dccc97fcfb98375adaa6cc484cffcd41ffd2f 2e692aa6c2377945820a789b98ce634c4f223794e570e94847687cd9ae881785 ea263aa74636cb87e7aead38e61c00c6eb01328331c81b3927d541319164a56f 546685dec288952a22c4efa496ccc521e9a9b97d00b9efddc39f40e8ddd6da3c 3f498d697124835ba2a7d6a83923094004251025526323c6e8636a3b7c7efe6d 04fde6a4a460a11568bc3793d7553ddb110d0715aff2784ced69a764fc8d86e3 38f10ea49a67dc5e3c42043084a0211c2b06157a8ab0de9618d96a4ae2504903 6ff847acfb29d7a7f853a0ef98520710b08502b468552c8308453836ce2ba908 bb69edf88caa0420b50f18964810b27c7443a2a4cfa5d9b69bbabaaecaf8edcd e6c4b93dbe903784bf5df76282809c0475c5e732e6b5f9580fe156725ff47321 b292d17f4eef5e9e361179e20ac67f38a7340df9ccd24fe4529c44126cb7a952 49346b10a892faf7e246f0b98040206dae5fe2a3f788c508f8d2a9313c4799e1 63afd29c5e925b8cd647823aa1641ecb55492be0e297acd00594dbe5b5b90666 e9f555a6f587cad979dc0367d3444b2c05f810b3bc3d582f1de92d7ca55f09d9 bddc6394578c3f15a8159f8202bf60a237586a958e79422c2fca5cf0c174e86d b87ce146d5d0b64621ab82b99d883d96e0464e6c76345abdf2737ccb1a20fb64 3d17207d51936eca87b880266ab67bf85eabf15cf655eddfc8263eda217245e0 dfbf7e7ce5afb1e353dd7f657a24f26e73c52e130eeaff9d37152abe24ff407d cb0eed06e33a4e77eed4e11b9ec5ed3d93b47b013506190d48f60131b85f136a 29a9eb6c816bf5581ba3196fb1a96e5cb3d95a2d35ee62e6839411d5d079272b 3a536cdf086ee98dd184c53bd64e4ffde3633ddfc0b349fd435d473c517c9e96 b4d3fe5894ec7e288f83349557f0b60a17da5d1d5dd214f7d9534d5af4a91e02 dcb5b8d8270b4a51a7702fa716ff9bc230cd449329cac5aae13f168563e4345a be0786d9c37f8a5fc2ca13c999a891fc545a9e5b83b24d672bc5f8c259c23b35 071b1b10c6275f038d284b52d79a1c42c8dc2d97c2896944a1548ed60e8db912 9ccaff01cc40a6ee154dacc28acb742c40bdb44d3025148503c88e3db483f447 12682388937f482770c8a21cd7794352801a58ba50861a692e1cd5fab8fcd194 1465c1522ebb85027e7b6455f082d8f61806c80dfee83f3bdcb6a753218e8a71 6fb3bbf330efe2ab1423ae3bd655eab1d3169e6796b3e42800293dcc06501d9d 0ccdaa72dfb815defd0ee529f7a386ce221bdb2ac52ed763160faef9c63c5679 6cd44f04619ec52f71aed76819a4c879befa712bb030544b4087bbd995e7ba48 3a2c4b62e15791bc058f14172ecadcc188549869c0110e54ec752dbd1e5f66aa cf5a3e17465fd81a811f519d3465c77a2fab42d7fc54e5529ed7e6ad4ecbbb1a e5a880e372596aae23304ba6ae96d8e860a388fb455c1b4eee30897a02351bdf 204b649ef20619a149735f6035b6bf9905c13d6f932eec4f444e1e8d85ab40de 71e5e432a28796f11351e15ba2ff91e281e9e6f2900750cb22c18ca16ecad839 383fd50f54c43eed1059ffc914ff470bb7b230508f8ae8aa02d478888558c35f 80845fd1b0558d3e54b9828543fd6e457e68d113f9f5c1eb6ce4b0b67aef8a32 c05a80ce3eeb95745d6f674135547d5f8972b02a3b738de88a3cfc842de2d8a6 b7f629626bf39d85cb9cad938e06e915a036e58880a95840ecc2af06e8713e79 54b649febdeaa6076fcee15d124ff59c78d58d9504491a3a95b6a522240907a9 11fb89d3931da26454783dc00c34816d0e352cf66d5300ddd304065a76be8e14 5ce10f431718174c9f28aefd6fa4eb886d3f11166adb8502d6ed9b8cb44835dc 61b837c8004a47a3f5da2ac8d44dc4f4b857da1fd53f743a5e67ce20987d969f 12b48b7e6857cc4235ca436c857ada6386d1284dc54bae61af3c97df9d898a06 55fd99e79335c21f3d15c06ebe75ef2a61b272e26b55de2f69d3760e94048d02 d77a12e32418f480d981f69ddc70bf0b259d8823fcd6d2634660cdfe5369df06

Samples with notification listener behavior:

17da5d1d5dd214f7d9534d5af4a91e02 8c7d408765ca39ef8df036b5ee2e02a21f78f59f1c31d819c03bcf8a2cc5cb96 dcb5b8d8270b4a51a7702fa716ff9bc2a64ab2b9af4336855b7344c80acbafb3 60a388fb455c1b4eee30897a02351bdfb292d17f4eef5e9e361179e20ac67f38 236d3841db80b4d6e1afd50cb92ba715befa712bb030544b4087bbd995e7ba48 40bdb44d3025148503c88e3db483f447a6bdf0db60c64d25bd250b3b4ca737d0 5ff61232930ec75b376d231bb39423fae3633ddfc0b349fd435d473c517c9e96 d4d99873da43d32d7a0be2b6811e15ea88549869c0110e54ec752dbd1e5f66aa 2fab42d7fc54e5529ed7e6ad4ecbbb1a04fde6a4a460a11568bc3793d7553ddb 3a2c4b62e15791bc058f14172ecadcc11806c80dfee83f3bdcb6a753218e8a71 17bc83ed0eb5ed77bffbae8c4abb35015c9f220fed5f1b1b93d18d9c30d4b2bc 71e5e432a28796f11351e15ba2ff91e275c5e732e6b5f9580fe156725ff47321 0ccdaa72dfb815defd0ee529f7a386ce9ccaff01cc40a6ee154dacc28acb742c 12682388937f482770c8a21cd7794352eb01328331c81b3927d541319164a56f

*** This is a Security Bloggers Network syndicated blog from Bitdefender Labs authored by Oana ASOLTANEI. Read the original post at: https://labs.bitdefender.com/2020/10/fake-users-rave-but-real-users-rant-as-apps-on-google-play-deal-aggressive-adware/