Porn clicker malware could be hiding in your apps
Security researchers have discovered 'porn clicker' malware hidden in unsuspecting apps on the Google Play store.
A Bitdefender study identified nine such apps masquerading as simple game apps. While six had since been removed, three were still available at the time of Bitdefender's disclosure.
Porn clickers are designed to repeatedly open links to porn sites to earn the operators money in the form of illicit affiliate advertising money.
The apps are designed to open one of a series of 175 hard-coded websites in hidden windows without the user's knowledge every 60 seconds while the apps are being run.
Porn clickers have been known to generate substantial revenues for attackers. In addition, end users downloading one of the infected apps onto company-issued or managed devices could find themselves having to justify why they are seemingly downloading porn at work.
Bitdefender has advised smartphone users to consider adopting mobile security software capable of identifying these and other malware threats. This is even more important for users of third-party app stores, the company said.
An app's rating and comments also sometimes offer an indication that something might be wrong with a listed app.
Why we need to redefine cybersecurity success to support CISOs
When Notifiable Data Breaches statistics are released we should look at the nature of the...
Is 2026 the year of identity? Just follow the money
What $40 billion in cyber acquisitions says about the future of identity security.
Proactive cybersecurity must lead innovation in Australia’s AI future
AI presents extraordinary opportunities for productivity, innovation and growth but it also...
