These 21 apps are adware and you should not be using them, uninstall them right away
According to Avast, these 21 apps, if they were on your smartphone, would bombard you with intrusive ads and that notched up a huge phone bill.
Google has been categorically removing apps from the Play Store for either being infected with malware or for violating its app store policies. Now, while Google is pretty meticulous and the rules are stringent, there are apps that manage to slip in that are either adware or are malware-infected.
This time around, security research firm Avast found 21 apps that are loaded with adware and while they look like games, they end up damaging your device.
According to Avast, these 21 apps, if they were on your smartphone, would bombard you with intrusive ads and that notched up a huge phone bill. Also, to understand the extent of damage they can cause, these apps have been downloaded almost 8 million times. And at the time Avast published their report, 19 of these 21 ads were still available for download and some of them were even serving ads outside the application.
Avast said that these apps were a part of the HiddenAds family. HiddenAds is a type of Trojan that triggers several ads once it is downloaded.
Several reviews on the listing page of these apps mention that they were shown as ads on YouTube and the game which was advertised was very different from what was being offered. Soon enough, the advertisements started showing up.
Google has pulled these apps off the Play Store and by any chance, if you have been using any of them - delete them right now.
Here are the 21 apps:
Helicopter Attack – NEW
Assassin Legend - 2020 NEW
Find 5 Differences - 2020 NEW
Find the Differences - Puzzle Game
And although Google has been trying everything to prevent HiddenAds from entering the Play Store, these apps do end up sneaking into the app market.
Avast states that “users need to be vigilant when downloading applications to their phones and are advised to check the applications' profile, reviews and to be mindful of extensive device permission requests.”