Researchers at Check Point have identified an auto-clicker malware family operating inside the Google’s Play Store. Disguised in over 56 applications and downloaded over 1,000,000 times globally, the malware -- dubbed 'Tekya' -- commits mobile ad fraud by imitating the actions of a user, clicking ads and banners from ad agencies like Google's AdMob, AppLovin', Facebook, and Unity. Of the infected applications 24 targeted children, ranging from puzzles to racing games. The rest of the infected applications targeted users of utility applications, such as cooking, calculator, download, and translator apps. Tekya infiltrated the Google Play Store by hiding its malicious…
[Continue Reading]
Aucun commentaire:
Enregistrer un commentaire