Jump to content

Recommended Posts

I initially installed MBAM Android because I'm infected with a known Stock Browser Pop Open Advertising app BS.

'ad.leadboltads.net' Pops open my stock browser on restart/boot.
MBAM didn't catch this, Lookout Security & Antivirus caught this, they don't have a forum to help me.
This originates from a benign "FREE" app, that updates later (3 months), after you download it and install it.

The app is ChargeBar (free): https://play.google.com/store/apps/details?id=com.tombarrasso.android.batterybar

ChargeBar states on the Google Play that the app is advertising driven, and, the advertising can be removed by deleting the app,,,,this part is a lie.

I have deleted the app but the the browser pop open advertising is persistent.

Lookout Security & Antivirus can not find the new location of the malware.

By the very definition, this is malware, and, ChargeBar (Asgard Casino Apps) is involved in the distribution of malware.

They are using Google to distribute this malware, abet, that app is benign in it origin.

Sneaky aren`t they.........

 

#1) I would like to get this crap off my phone.

#2) I need to bring this to Google's attention, and have the developer banned from the Play store.

 

Any help here or is it back to XDA.......

MichaelT

Link to post
Share on other sites

Hello Michael,

 

I have contacted our developers in regards to this issue. I will follow up with feedback as it becomes available.

I really don't want to flash a new ROM, although if I did, I'd go back to the stock ROM.

I hope something new can be learned here, a new definition or detection can be found in all this.

Understanding how the money flows in the malware/virus industry(?), I would bet that Leadboltads owns Asgard Casino Apps as a distributor for their malware, as well as hosting lots of other apps as well.

Here's a link to a post I commented at XDA (post #7): http://forum.xda-developers.com/showthread.php?p=48462170#post48462170

Link to post
Share on other sites

Hello MichaelT,

 

In response from our MBAM Mobile development team, it’s possible there is another app with an ad library installed, not being detected by Lookout. Unfortunately, we don’t have full Adware detection functionality yet, mostly on a case by case basis.

 

We will look into this app, in the meantime you can install an ad-on inspecting app like “Addons Detector” which will look at all apps this push notification behavior.

 

https://play.google.com/store/apps/details?id=com.denper.addonsdetector

Link to post
Share on other sites
  • 2 weeks later...

Hello MichaelT,

 

In response from our MBAM Mobile development team, it’s possible there is another app with an ad library installed, not being detected by Lookout. Unfortunately, we don’t have full Adware detection functionality yet, mostly on a case by case basis.

 

We will look into this app, in the meantime you can install an ad-on inspecting app like “Addons Detector” which will look at all apps this push notification behavior.

 

'Addons Detector' didn't find ad.leadboltads.net, or ChargeBar or anything for that fact.

Even after I deleted ChargeBar, it couldn't find where the file/folder that the browser popopen was located, or a differnt app that the advertising may have been connected to.

The only app that detected the presence of ChargeBar and ad.leadboltads.net, was Lookout Security & Antivirus.

Never mind though, I loaded MROM in and I'm doing a clean install of all apps.

 

Even if I had pirated/cracked apps in my phone,  that were infected with ad.leadboltads.net Malware.

The reciepiant of the revineu from the page clicks is Lead Bolt Ads, and so, they are the ones distributing Malware in pirated/cracked apps.

Am I right!

Link to post
Share on other sites
Guest
This topic is now closed to further replies.
  • Recently Browsing   0 members

    No registered users viewing this page.

Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.