BeiTaAd – New Malicious Adware Discovered on Android


July 18, 2019

The Android ecosystem is a scary, scary place. Where Apple’s iOS App Store is a walled, curated and highly regulated walled garden, Google’s Play Store is almost the exact opposite. It’s a wild, overgrown place where and there’s little to no oversight when it comes to what gets uploaded and distributed.Because it’s such a wild and lawless place, it’s not uncommon to hear stories of apps containing malware. Malware, as we all know, is “no bueno” and installing it on any of your IoT devices is generally a guaranteed and quick way to ruin your day.

If you’re an iOS user you can stop reading and get back to Candy Crush and that level you’ve been trying to beat since March.

If you’re an Android user you might want to keep reading…

Lookout, a cyber security firm that focuses on post-perimeter security (mainly regarding mobile devices), found 238 popular apps on the Google Play Store were infected with a new strain of malicious adware called BeiTaPlugin and that it had been put there on purpose.

The app developer, CooTek has apparently been baking this particularly nasty bug into their apps since 2018.  Apps from CooTek that include the adware have over 100,000,000 downloads.

Basically, one installed, the app will begin to solicit ads nonstop, even out of the app and it pretty much bricks your device. Lookout says it can take up to two weeks for the adware to activate.

Luckily, the 238 apps have been removed from the Google Play Store and shouldn’t harm people going forward. However, if your device has one of the apps installed on it, you might be a sitting duck for a bunch of unwanted advertisements. 

You can read more about the BeiTaAdPlugin over on Lookout’s blog ( Not only is there a full list of the apps affected by BeiTaAd there are also instructions included in the article that will help you to discover if the adware is currently installed on your device.

Like our blog? Subscribe using the CTA in the upper right hand corner of this page. Have a thought you feel like sharing? Use the comment section below or hit us up on Social Media (LinkedIn and Twitter). We can’t wait to hear from you.

Carl Keyser is the Content Manager at Integris.

Keep reading

Strong Cybersecurity Postures: How to Unleash their Power

Strong Cybersecurity Postures: How to Unleash their Power

In the vast digital landscape where virtual dragons and sneaky trolls roam a strong cybersecurity posture has never been more important. Imagine a band of modern-day knights led by our protagonist, Alex. Armed with a trusty laptop and a cup of coffee, Alex navigates...

How to Spot a Phishing Attack in 2023

How to Spot a Phishing Attack in 2023

In 2023 cyber threats lurk behind every tree trunk in today's digital jungle, and cybersecurity awareness is more critical than ever. Among the craftiest of these threats are phishing attacks. Phishing attacks are cunningly engineered with social manipulation at their...

How to Choose an IT Consultant in Boulder, CO

Regardless of industry size or type, Boulder IT consultants play a massive role in the way companies in the Boulder area do business. While most companies may have their own in-house IT department, many of these departments are small and cannot handle all the...