An ad blocker software available outside the Google Play Store has surprised Android users with a large volume of ads, many of which are vulgar.
Since the software is cleverly unseen from the user’s eyes,
it is difficult to remove and makes things worse for the user.
According to a document released by Malwarebytes, an anti-malware company, the software,
call Ads Blocker (not to be confuse with Ad Blocker),
uses numerous tricks to unwittingly and frequently bombard users with ads.
The first requirement that users encounter when installing this malware is to display permissions on other software.
Next,
Ads Blocker creates a VPN connection and monitors network traffic. Finally, the malware adds a widget to the smartphone homepage by requesting users permission.

In fact, user-approved VPN connection, which is a required standard in many legitimate ad-blocking programs, allows the malware to be running in the background.
This, along with permission to appear in other applications, helps Ads Blocker to display ads in abusive and unauthorized ways.
The ads that this malware shows are all over the page. The program displays ads not only in the default browser, but also on the notification page.
The same goes for the widget already installed. Nathan Collier , a Malwarebytes researcher, said in the document:
Android malware [Ads Blocker] is ruthless in terms of frequency and advertising capabilities and capabilities. The fact is that while writing this text, this [malware] repeatedly displayed one ad every few minutes on my test machine.
Collier goes on to say that the content of ads displayed covers a wide range, some of which are unpleasant and in some cases even vulgar.
As annoying as this fake ad blocker is, it is equally difficult to remove. Even no malware icons are displayed on the phone’s screen.
There is no mention of Ads Blocker in the app info section in the Android settings (App info). Because the program with its white cardi bears its original name.
Malware’s secrecy means that many people are constantly trying to remove it. Ads Blocker displays another icon with the same white box on the notification page that is pressed, creating a dialog box and trying to install more advertising programs.
Collier then remove it by searching for an entry in the App info settings, which was An store at 1.2 MB. Users can also remove the malware in the same way.
Of course,
this method is not very useful in version 7 of the Android operating system because of the lack of app volume in the App info settings. Another alternative is to access the storage in Android settings and select the Apps tab.
Although the software’s name and icon may not be display as previously state, it can be detect base on the size of the 2.5 MB malware.
In this case,
users should immediately press the clear cache and clear cache icons by pressing the section on the 4.8MB input
and entering the corresponding part and then uninstall the program. . People can also remove malware with the free Malwarebytes app for Android.

Malwarebytes researchers still don’t know how Ads Blocker malware is distributing. VirusTotal scan service data from the research firm indicates that the reason for the spread of the malware in the United States is the likely use of third-party software stores.
The post, posted in an online forum in Europe and in German, provides evidence that indicates the potential for Ads Blocker malware to spread in Europe.
The Malwarebytes app has so far found only 1 out of 7 instances of malware infected.
Researchers at the company believe that the total number of infected devices is far higher than the figures.