Apps with 1.5 million installs were engaged in click fraud and draining device batteries

Brother

Professional
Messages
2,590
Reaction score
533
Points
113
853f9c1578b71a0d94737.png


Symantec experts found malicious applications on Google Play that clicked invisible ads, slowed down the performance of infected devices and drain their batteries.

Click fraud features were found in the note app (Idea Note: OCR Text Scanner, GTD, Color Notes) and the fitness app (Beauty Fitness: daily workout, best HIIT), which were installed over 1.5 million coach times and downloaded in total. on Google Play over a year ago by Idea Master.

Figure-1.png


Malicious application activity started with a message via Android Notification Manager, clicking on which triggered a hidden ad display. Researchers say that a creative malware developer used Toast Notifications to load ads. The fact is that this method made it possible to hide the advertisement from the victim by placing the notification outside the visible part of the screen.

Ghost-Click-Toast-400x90.png

Ghost-Click-Canvas-400x188.png


For example, the malware author used translate () and dispatchDraw () and the Canvas object was invisible to the user. After that, an automatic clicker entered the business, which clicked ads, which brought income to the application developer.

Ghost-Click-Ad-Clicks.png


Analysts point out that applications have long gone unnoticed due to the use of a legitimate wrapper commonly used to protect intellectual property. This made it difficult for Google's automatic scanners and the work of cybersecurity experts who studied APKs.

Although the advertisements were invisible to the owners of the infected devices, the malware had a negative impact on performance, the battery started to drain much faster, and visits to numerous advertising sites generated additional mobile traffic.
 
Top