The fake apps also contain self-preservation code which makes their removal complicated.
ESET malware researcher Lukáš Štefanko said: "These aggressive ad-displaying apps attempt to hide their functionality from security researchers by deploying techniques, which succeeded in being downloaded over 200,000 times in a single month.
"The anti-Bouncer technique used by these apps obtains the IP address of a device and accesses its WHOIS record.
"If the information returned contains the string ‘Google’, then the app assumes it is running in Bouncer.
"Should the app detect an emulator or Google Bouncer environment, the ads are not displayed. Instead, the app will simply provide game cheats, as expected."
Following ESET’s notification, Google has removed these unwanted applications from the Google store.
Štefanko said: "Although it’s good that Google removed the apps from the Android Google Play store after we informed them of the issue, it is clear that more attempts will be made to bypass Bouncer and spread apps containing undesirable code."
This article is from the CBROnline archive: some formatting and images may not be present.
Join Our Newsletter
Want more on technology leadership?
Sign up for Tech Monitor's weekly newsletter, Changelog, for the latest insight and analysis delivered straight to your inbox.