Cheetah and Kika Apps Was Accused Of 'Ad Fraud'
Parvati Divakar - Dec 01, 2018
An app analytics company discovered Cheetah Mobile and Kika Tech was involved in ad-fraud.
- Builder.ai Collapse Exposes Massive AI Fraud in Tech Industry
- Woman Ordered An iPhone 12 Pro Max, Received Apple-Flavored Yogurt Instead
- Proud Moment! Made-In-India WCC3 App Wins Play Store’s Best Of 2020 Award
Some apps on the Google Play Store were alleged to involve in an ad-fraud, according to Buzzfeed News. To be more specific, there are eight apps, namely Clean Master, CM Launcher 3D, CM File Manager, Battery Doctor, Security Master, Cheetah Keyboard, CM Locker, and the Kika Keyboard.
Cheetah Mobile which is the 4th largest publisher in the Google play store, as well as the Apple app store, is responsible for seven out of eight apps which had involved in this case. The remain app, which has 60 million monthly active users, belongs to another Chinese company, Kika Tech. In total, these apps have more than 700 million active users each month and more than 2 billion downloads.

Kochava, an app analytics company shared with Buzzfeed News that the two companies illegally exploited the user's right to steal millions of dollars. It's reported that these apps request permission to access user data, along with the ability to track keystrokes as well as other downloaded apps.
Kochava says that these apps were tracking other apps that users who had installed onto their phones and allowed them to take credit claim the bounty for referring the user of that app to this other app that they installed.

In fact, many app developers have to pay a fee to their partners who can promote their apps. And by using click injection and click flooding techniques. Cheetah and Kika can get bounties for app installation, even if they are not relevant to app installations.
Bill Hu, Kika Tech CEO, said that the company was not entirely aware of the fraud. Also, Kika Tech was carrying out an investigation into the incident and would fix this if it were due to a coding error.
Plus, Cheetah Mobile stated that the click injection was attributed to third-party SDKs, software development kits. The company said that it requested ads through SDK from thóe ad platform and showed their ads. But they don't control SDKs' behaviors.
It is notable that Google recently advertised one of these apps as "go-to app" on Google Play.
Featured Stories
ICT News - Mar 29, 2026
FTC Takes Action Against Debanking Practices by Major Financial Firms
ICT News - Mar 27, 2026
Palantir CTO Identifies Iran Conflict as First Large-Scale AI-Driven War
ICT News - Mar 24, 2026
OpenAI on the Brink: Major Setbacks Signal the Bursting of the AI Bubble
ICT News - Mar 20, 2026
Top 10 Most Popular Social Media Sites Based on User Count in 2026
ICT News - Mar 19, 2026
Billion Dollar Blunder: Meta Shuts Down Metaverse After Wasting $80,000,000,000.00
ICT News - Mar 18, 2026
X to Introduce Regional Controls for Posts and Replies
ICT News - Mar 17, 2026
Is DLSS 5 Helping Games or Hurting Developers' Creative Style?
ICT News - Mar 16, 2026
AI's Role in Warfare: US Strikes on Iran Unveiled
ICT News - Mar 15, 2026
Elon Musk's Bold Chip Venture: Tesla's Massive Fab Initiative Sparks AI Hardware...
ICT News - Mar 14, 2026
Elon Musk's High-Stakes $109 Billion Lawsuit Against OpenAI and Microsoft
Read more
ICT News- Mar 29, 2026
FTC Takes Action Against Debanking Practices by Major Financial Firms
The Federal Trade Commission has sent warning letters to PayPal, Stripe, Visa, and Mastercard over concerns about debanking lawful businesses and consumers.
Comments
Sort by Newest | Popular