A newly discovered Android malware was confirmed to have infected around 20 million users. The Clicker Malware, used 16 different malicious apps to get into the Google Play Store. Once there, it affected millions of users.
The Clicker Campaign
McAfee researchers found that the malware is hiding in applications that are disguised as legitimate tools. These applications are targeting Android phone users.
- These tools include Flashlight (Torch), QR readers, Camera, Unit Converters, and Task Managers.
- Its hard to tell the difference these days the apps may look like well-made Android software. However, they are hiding ad fraud features, equipped with remote configuration and Firebase Cloud Messaging (FCM) techniques.
- These Android applications are opened the malware is secretly downloaded in the background.
The researchers found that this malware is designed to disrupt the mobile advertising industry. It targets the ad-supported business models of the mobile ecosystem. The malware in turn generates revenue by displaying fraudulent ads on your device.
Attacks Are Also Escalated
In addition to targeting utility apps, cybercriminals are also using social networks to steal users’ accounts and credentials.
- A fake version of the popular WhatsApp chat messenger, dubbed YoWhatsApp, was found circulating on the internet. The fake version claimed to offer additional features such as customizing the interface and blocking access to individual chats. However, it was nothing similar to the original version and instead stole access keys for users’ accounts.
- Meta removed of over 400 malicious Android and iOS apps targeting Facebook users. The primary goal of these apps was to steal users’ login credentials.
Consumers should install security software on their phones. That way, they can protect themselves from virus attacks. They should also avoid downloading apps from unofficial websites or use crack versions of legitimate apps to avoid viruses.