Porn clicker malware could be hiding in your apps
Security researchers have discovered 'porn clicker' malware hidden in unsuspecting apps on the Google Play store.
A Bitdefender study identified nine such apps masquerading as simple game apps. While six had since been removed, three were still available at the time of Bitdefender's disclosure.
Porn clickers are designed to repeatedly open links to porn sites to earn the operators money in the form of illicit affiliate advertising money.
The apps are designed to open one of a series of 175 hard-coded websites in hidden windows without the user's knowledge every 60 seconds while the apps are being run.
Porn clickers have been known to generate substantial revenues for attackers. In addition, end users downloading one of the infected apps onto company-issued or managed devices could find themselves having to justify why they are seemingly downloading porn at work.
Bitdefender has advised smartphone users to consider adopting mobile security software capable of identifying these and other malware threats. This is even more important for users of third-party app stores, the company said.
An app's rating and comments also sometimes offer an indication that something might be wrong with a listed app.
Solving the IoT attack surface challenge: a practical playbook for IT managers
As IoT environments get more complex, adopting zero-trust architectures to verify every device...
Defending against AI-powered cyberthreats
Improving cyber resilience is no longer about perimeter defence or reactive patching, but...
Lessons from the Land Rover cyber attack: seeing risk before it strikes
The recent Jaguar Land Rover cyber attack saga is a stark demonstration of what happens when...
