Andrews developers 殇: regular application has been the proceeds of the cottage ads are snatched

Source: Internet
Author: User
Tags .mall advertising advertising content android android application android applications android platform android system
Cottage application spread Andrews developers 殇

Formal applications are frequently cottage, the money earned by others to take away

IT Times Li Dong

Andrews open and free features such as features, so that developers and users rush, users are getting used to Android applications such "free lunch." But behind the free, it has a huge shadow of security.

Formal applications are frequently "top package"

"They completely misappropriated the official LOGO of our fancier, even the introduction of the content is exactly the same." Faced with the "love Fan children" cottage version of the application, Ai Fan children, a responsible person is furious. He told IT Times reporter recently appeared in the millet market with the same name as the love Van children's applications, including software introduction, the icons are exactly the same, known as Ai Fan children's application of "fans Edition", but developers Addition of a large number of internal advertising content, but in reality is "hanging out".

"Most small businesses do that, and big companies do not consider the effects." An Android app developer told IT Times that small businesses often use some well-known apps in their cottages to save costs and make money, After its official APP dismantling, embedded inside their own advertising content and even malicious code, this part of the developer by the industry as "packing party."

Not only is the "love Van children" Android application is cottage, some well-known Android applications are not spared.

The reporter saw the malicious application announced by Fudou.com in conjunction with "Security Butler". Recently, the most popular "Fishing Daren", "Happy Ranch" and "Fruit Ninja" applications on the Android platform have all hit one another. Even "Baidu Map "" Baidu Music "these well-known applications have not been spared. These pirated applications and their official APP almost no difference, but contains malicious deduction traffic, privately send deductions SMS, download payment applications such as background code.

Advertising proceeds are robbed

One of the ways of "packing the Party" is to crack down on formal applications and then use it to build up their own advertisements for profit.

"My hard-working software, being someone else to the cottage, and even packaged directly, it is depressing." Small people (a pseudonym) is a developer of Android applications, he told the "IT Times" reporter said that this Cottage application process is easy, the cracker will join the crack for their own profit, and some advertising platforms also "like" this low-cost piracy applications, because the latter is not high share of advertising.

"Now mainly click-to-charge (CPS) mode, usually between 0.15 to 0.2 yuan, that is, the user clicks on an ad, developers will be able to get 0.15 to 0.2 yuan of income as long as your user experience is not particularly bad , You can get long-term advertising cooperation and profit sharing. "An advertising platform merchants told reporters. Their own proceeds are grabbed by others, which makes the painstaking development of applications, and rely on built-in ads to survive Android application developers, very depressed.

Users suffer security risks

Another way of "wrapping up the party" is to remove or replace the built-in advertisement of the application in the name of user-friend, to attract the user to download and use under the name of "cracked version", and to embed the malicious code or permission behind the application " back door".

"The normal Android application's permission requirements are generally related to its own functions. Applications such as weather forecasting require location permissions to obtain the current location of the user. Applications such as call management require user's contact and call permissions, and normal application permissions Requirements will not exceed the software features. "Mobile security vendors, Beijing An Guan Jia technology company marketing Gu Na told reporters that users in the installation of Android applications, there will always be a variety of" the program needs to obtain the following permissions " But contrary to normal use, malicious applications often require permissions that go beyond the scope of the software's capabilities.

Application software, the higher the user rights requirements, the greater its scope of the function; and malicious software will use the device permissions to crawl user information, theft of privacy. And some piracy applications run malicious programs in the background, not only sneak operators SP service, but also intercept carrier confirmation SMS, which makes ordinary users difficult to detect.

"While some third-party markets are now aware of the magnitude of the problem and are beginning to work with security agencies to monitor the security of their applications in the market, due to the openness of the Android platform, full regulation of the APP is very Difficult. Due to the current mode of developers on the APP no real-name hard-line requirements, but also to download a wide range of channels, so its security is difficult to guarantee. "Gu Na told the IT Times reporter, for quite a mixed bag of Android applications, users want Develop safe use habit, do not install the unknown APP, try to download the application in the official website or download the application which has passed the safety test.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.