More than 300 Play Store apps found to be using devices as clickfarms

The way this works is simple: infected apps are constantly requesting ads and then claiming the user has clicked on them, which generates ad revenue for the fraudster. And although this may not sound like that big of a deal, it results in both battery and mobile data drain, as well as potential lag on low-end devices. Or to put things in perspective, a single app left overnight requested more than 3,000 ads and "clicked" on 169 of them.
The numbers associated with this kind of malware are impressive, too: more than 300, with a cumulative 4–14 million installs. The apps themselves are mostly live wallpapers or simple utilities — the researchers specifically pointed the finger at the following app developers: Attunable, Classywall, Firamo, FlameryHot, NeonApp, Goopolo, Litvinka Co, Livelypapir, Tuneatpa Personalization, Waterflo, X Soft, and Zheka.
The research comes from ad fraud detection agency eZanga, who claims to have immediately notified Google of the malicious apps. And while Google has historically been quick to take action in similar occasions, it seems clear its current malware detection practices aren't working as well as they should be.
Things that are NOT allowed:
To help keep our community safe and free from spam, we apply temporary limits to newly created accounts: