Porn clicker malware could be hiding in your apps
Security researchers have discovered 'porn clicker' malware hidden in unsuspecting apps on the Google Play store.
A Bitdefender study identified nine such apps masquerading as simple game apps. While six had since been removed, three were still available at the time of Bitdefender's disclosure.
Porn clickers are designed to repeatedly open links to porn sites to earn the operators money in the form of illicit affiliate advertising money.
The apps are designed to open one of a series of 175 hard-coded websites in hidden windows without the user's knowledge every 60 seconds while the apps are being run.
Porn clickers have been known to generate substantial revenues for attackers. In addition, end users downloading one of the infected apps onto company-issued or managed devices could find themselves having to justify why they are seemingly downloading porn at work.
Bitdefender has advised smartphone users to consider adopting mobile security software capable of identifying these and other malware threats. This is even more important for users of third-party app stores, the company said.
An app's rating and comments also sometimes offer an indication that something might be wrong with a listed app.
2026 will be the year identity defines cyber defence
2025 gave us an initial look at what happens when AI scales faster than identity controls.
How to harness AI to advance cybersecurity
Organisations that prioritise AI-enabled security and a culture of continuous learning...
Solving the IoT attack surface challenge: a practical playbook for IT managers
As IoT environments get more complex, adopting zero-trust architectures to verify every device...
