Porn clicker malware could be hiding in your apps
Security researchers have discovered 'porn clicker' malware hidden in unsuspecting apps on the Google Play store.
A Bitdefender study identified nine such apps masquerading as simple game apps. While six had since been removed, three were still available at the time of Bitdefender's disclosure.
Porn clickers are designed to repeatedly open links to porn sites to earn the operators money in the form of illicit affiliate advertising money.
The apps are designed to open one of a series of 175 hard-coded websites in hidden windows without the user's knowledge every 60 seconds while the apps are being run.
Porn clickers have been known to generate substantial revenues for attackers. In addition, end users downloading one of the infected apps onto company-issued or managed devices could find themselves having to justify why they are seemingly downloading porn at work.
Bitdefender has advised smartphone users to consider adopting mobile security software capable of identifying these and other malware threats. This is even more important for users of third-party app stores, the company said.
An app's rating and comments also sometimes offer an indication that something might be wrong with a listed app.
Why AI agents are a new insider threat for business
AI-powered insiders are non-human actors operating within the perimeter, inheriting trusted...
Securing SMB organisations: closing the cyber gap through culture
Limited budgets and resources mean SMBs cannot financially prioritise cybersecurity as much as...
The silent cyberthreat lurking in mismanaged tokens
It took years of painful breaches for organisations to recognise the importance of secure...
