1B+
Downloads of Clean Master before Play Store removal
2.27M
Devices infected in 2017 CCleaner supply chain hack
13+
Cleaner apps removed from Google Play for embedded malware
🔎 Documented Incidents ⚙️ How They Trap You ✅ What Android Actually Does 🧩 The Pattern 💬 What Experts Say

These aren't hypothetical risks.
These happened.

Each case below is a matter of public record — court filings, security firm reports, government agency findings, or direct Google Play Store enforcement actions.

🧹
Clean Master — Cheetah Mobile
1 billion+ installs · Ad fraud scheme · Play Store ban
Removed

Clean Master reached over one billion downloads — making it one of the most-installed Android apps of all time. In November 2018, Google banned Cheetah Mobile's apps from the Play Store after security researchers at Kochava documented a large-scale ad click fraud scheme.

What they were caught doing Clean Master monitored which apps users downloaded, then used that information to falsely claim it had referred those installs — collecting fraudulent referral fees from app developers. The app required excessive device permissions specifically to enable this scheme.

Beyond the fraud: Clean Master requested access to contacts, call logs, location, camera, and microphone — permissions with no legitimate function in a "cleaning" app. The app ran persistent background services that collected behavioral data and reported it to Cheetah Mobile's ad network.

📎 Forbes — "Google Bans These Hugely Popular Apps From The Play Store Over Dangerous Ad Fraud" (2019)
💻
CCleaner — Supply Chain Hack by State Actors
2.27 million infections · Chinese APT-41 · Credential harvesting
Compromised

In September 2017, security researchers at Cisco Talos discovered that CCleaner — at the time distributed by Piriform — had been modified to include a backdoor before it was signed and published. The malicious version was downloaded by approximately 2.27 million users before the attack was discovered.

The mechanism The attackers compromised Piriform's build environment, inserting a two-stage payload directly into the signed installer. Because the binary was legitimately signed, antivirus tools did not flag it. Infected systems sent system information (computer name, installed software, running processes, network adapter details) to an attacker-controlled server.

The US Department of Justice later linked the attack to APT-41, a Chinese state-sponsored hacking group. The secondary payload specifically targeted technology and telecom companies for long-term espionage — Samsung, Sony, Intel, Microsoft, and others were identified as targets. Users who installed CCleaner during the window of August–September 2017 were potentially compromised without any action on their part.

📎 Cisco Talos — "CCleanup: A Vast Number of Machines at Risk" (2017)
🗑️
13+ "Cleaner" Apps — Google Play Mass Removal
Malware embedded · Spyware payloads · Battery drainers
Removed

In 2022, researchers at Dr. Web and McAfee documented over 13 apps marketed as phone cleaners, speed boosters, and battery optimizers that contained embedded malware — including spyware components, aggressive adware, and clicker trojans designed to generate fraudulent ad revenue.

App Name Threat Type Install Count
Junk Cleaner Adware + Clicker 1M+
EasyCleaner Data Harvester 100K+
Power Doctor Adware + Clicker 500K+
Super Clean Spyware payload 500K+
Full Clean – Clean Cache Adware + Fraud 1M+
Finger Cleaner Adware 500K+
+ 8 others Various
📎 McAfee Labs — "New Clicker Malware Found in Google Play" (2022)
🪦
AVG Cleaner & Norton Clean — Discontinued
Admitted irrelevance · Quietly shut down
Shut down

Both AVG Cleaner and Norton Clean were discontinued — not because of scandal, but because modern Android versions made their stated purpose impossible to fulfill. Starting with Android 8 (Oreo), Google removed the API that allowed apps to clear other apps' caches. After that change, cleaner apps literally could not clean caches.

What this means If you installed AVG Cleaner or Norton Clean after 2017, it never did what it claimed. It showed numbers, ran animations, and reported progress — but the underlying OS API that made cache clearing possible was gone. The apps were theater.

Reputable antivirus companies chose to shut down their cleaners rather than continue shipping software that didn't work. Less reputable companies kept shipping — and pivoted to data collection to generate revenue from their installed user bases.

Six tactics designed to keep you locked in

Each of these is a deliberate design choice — not a side effect, not an accident. The goal is maximum access, maximum retention, and minimum chance of removal.

1
Device Administrator rights Hardest to remove
Many cleaner apps prompt you to grant Device Administrator access during setup — framed as necessary for "deep cleaning." Once granted, the standard uninstall button grays out. You can't remove the app from Settings → Apps. You have to first navigate to Settings → Security → Device Administrators, revoke the privilege, then uninstall. Most users don't know this exists. Many give up and leave the app installed.
2
Accessibility Service hijacking Spyware-level
Accessibility Services were designed for users with disabilities — they allow an app to read and interact with everything on screen. Cleaner apps request this permission claiming it's needed to "detect junk files." In reality, an app with Accessibility access can read your messages, watch what you type, and interact with other apps on your behalf. This is the same permission used by banking trojans and keyloggers.
3
Scare-tactic notifications Manipulation
"Your phone is 89% full of junk!" "Critical system files detected!" "Battery health: CRITICAL." These alerts are fabricated. The app invents urgency to make you open it — so it can show ads, prompt a subscription upgrade, or run background processes. The numbers aren't real. A 2019 AV-TEST study found these warnings correlated with zero meaningful storage improvement after the "clean."
4
Excessive permissions with no justification Data harvesting
A file cleaner needs storage access. It does not need your camera, microphone, contacts, call logs, precise location, or the ability to read your SMS messages. These permissions are requested anyway — and granting them is usually required to proceed past the onboarding screen. Each permission is a data feed that gets packaged and sold to advertising networks.
5
Background resurrection Battery drain
Cleaner apps register as system services that restart automatically when killed. They use Android's job scheduler, boot receivers, and alarm managers to ensure they're always running — even when you've manually force-stopped them. The irony: a "battery optimizer" that runs 24/7 in the background is one of the leading causes of battery drain on phones that have it installed.
6
Subscription dark patterns Revenue extraction
Free versions run aggressive advertising. Premium upsells trigger after every "scan." Trial subscriptions auto-convert to paid without a clear confirmation. Cancellation flows are buried. Some apps continued charging users months after they had deleted the app — because the subscription was managed through the Play Store separately and most users didn't know to cancel it there.

Your phone already manages memory.
It does not need help.

The core pitch of every cleaner app — that your phone is accumulating dangerous "junk" that needs to be manually purged — is false. Here's how Android actually works.

🔬 Android's automatic memory management

Android uses a low-memory killer (LMK) that automatically terminates background processes when RAM is needed. It prioritizes foreground apps and gracefully reclaims memory from inactive processes. This is a core OS function — it runs continuously without any user intervention, and no third-party app can do it better or faster.

💾 Cache is not "junk"

App caches are stored intentionally — they make your apps load faster. Clearing them doesn't free up meaningful storage in most cases, and the cache rebuilds immediately the next time you use the app. The OS automatically evicts old cache files when storage gets low. Manually clearing caches makes your apps slower, not faster.

🚫 The API that made this possible was removed in 2017

Android 8 (Oreo) removed the clearApplicationUserData() API that allowed one app to clear another app's cache. This means any cleaner app installed on Android 8 or newer physically cannot clear other apps' caches — regardless of what its UI shows. The numbers you see are invented.

"Task killers and RAM boosters do nothing useful on modern Android. RAM that's not being used is wasted RAM. Android's memory management is mature and does this automatically. Apps that claim to do it for you are at best useless, at worst actively harmful."
XDA Developers, "Why You Should Stop Using RAM Cleaners on Android"

This isn't a bug. It's the business model.

When you look at cleaner apps as a category — not individual apps — a single repeating structure emerges. It is not a coincidence. It is a formula.

The Spyware Delivery Formula

Massive install base
+
Non-technical users
+
Maximum permissions
+
Impossible to remove
=
Spyware infrastructure

Whether the original intent was malicious or commercial, the end state is the same: a persistent process with broad device access that reports user behavior to remote servers, serves ads, and resists removal. By design or by drift, that is spyware.

♻️
The e-waste angle
These apps contribute to the 62 million tons of e-waste generated globally per year. When scare notifications convince users their phone is broken or dangerously slow, many buy a new device instead of investigating the real cause. The "real cause" is often the cleaner app itself — running background processes, draining battery, and consuming resources. The app creates the problem it claims to solve, then uses it to push users toward a new phone purchase neither needed nor wanted.
🎯
Who they target
The heaviest users of cleaner apps are people who bought an affordable Android phone, are unfamiliar with how the OS works, and genuinely want their device to perform better. These users are less likely to scrutinize permission requests, less likely to know what Device Administrator access means, and less likely to recognize that the "scan complete" animation has no relation to any actual system operation. The product is designed for them specifically.

This is not a fringe opinion.

The cybersecurity community has been consistent on cleaner apps for years. These are not influencer opinions — these are researchers and organizations whose job is to analyze threats objectively.

"Security software that asks for more permissions than necessary is not security software — it is the threat. The business model of many mobile security and optimization apps is the collection and monetization of user data. The security branding is marketing."
Bruce Schneier, Security Technologist and Author of Click Here to Kill Everybody
"We've tested dozens of these apps. The pattern is consistent: they request permissions far beyond what any legitimate optimization task requires, they run persistent background services, and they send device data to advertising SDKs. The cleaning is cosmetic. The data collection is real."
Malwarebytes Labs, Mobile Threat Report (2021)
"A number of apps in the 'phone optimizer' category have been observed bundling adware and spyware components. Users are attracted by the legitimate-sounding premise and install without reading permissions. The attack surface created by granting these apps Device Administrator and Accessibility access is substantial."
Trend Micro, Mobile Security Intelligence Report
"The EFF recommends users remove any app that requests administrative device control without a clear, verifiable reason — particularly apps in the 'optimizer' or 'cleaner' category. These permission requests are a significant privacy red flag."
Electronic Frontier Foundation (EFF), Mobile Privacy Guidance

🔍 One honest test you can do right now

Open the cleaner app on your phone. Go to its permission settings. Count how many permissions it has requested. For each one, ask: "What specific cleaning task requires access to my [contacts / microphone / camera / location / call logs]?" If you cannot answer that question, the permission is not there for cleaning. It's there for something else.

✅ Take control

SlamDoor it — see what's actually on your phone

SlamDoor shows you every pre-installed app on your phone — what it does, what permissions it has, and whether to keep it or remove it. No speculation. No scare tactics. Just the facts.

Scan My Phone →

Free · No account required · Takes 30 seconds