sb-nz logo
Story image

GhostClicker adware infiltrated 300 apps on Google Play

18 Aug 2017

A pervasive auto-clicking adware by the name of GhostClicker has infected as many as 340 apps from Google Play, many of which are still available for download.

Trend Micro researchers published a blog about the adware this week, which has hit apps across a range of categories. Those categories include file managers, QR scanners, GPS apps and media players, as well as popular game “Aladdin’s Adventures World” which was downloaded 5 million times.

As of August 7, 101 of those apps were still available from Google Play.

The GhostClicker adware buries itself in Google Mobile Services and in Facebook Ad’s software development kits with the simple name of ‘logs’.

The autoclick mechanism comes through Google’s mobile advertising platform Admob. It detects the device’s screen size and then attempts to display ads and use APIs for ‘ghostlike’ clicking.

GhostClicker is also able to generate fake traffic by inserting itself into download links through Google Store. It is also able to use its Command and Control server to open YouTube video links.

When users install infected apps, Trend Micro researchers report that some request device administrator permission but don’t explicitly say whether data wipes and password resets are part of their security policies.

“This can be a way to deter users from removing the app, taking advantage of the lengthy and nebulous process of uninstalling apps. It’s certainly not a user-friendly process: uninstalling an app with device administration requires that it be disabled first before an app can be removed,” researchers state.

GhostClicker has been spotted mostly in Southeast Asia including Japan and Taiwan, the United States, Russia and Italy.

The adware itself is a newer iteration of its 2016 version. The earlier version did not have the autoclick feature and device administrator permission requests.

“After the user unlocks the screen, the adware will pop up interstitial advertisements at certain intervals if the device is connected to a network with data. We encountered this version of GhostClicker in Aladdin’s Adventure’s World,” researchers state.

While GhostClicker is intrusive, drains CPU, mobile data and battery life, there is a way to stop it.

“GhostClicker can be mitigated by restricting the use of the device administration feature, which is typically used to create security-aware applications like enterprise device or BYOD management and antivirus apps. Everyday users won’t really miss out on much when doing this,” the researchers conclude.

Trend Micro says it has disclosed its findings to Google and is working with the company to take down the infected apps. Google Play Protect has also been updated to catch apps that violate Play policy.

Story image
Gigamon and Zscaler release cloud-first network detection for fluid workforces
“Our customers have significantly accelerated their digital transformation journeys during the pandemic, and this integration will help them better respond to threats.”More
Story image
Acronis expands global data centre network, including new facilities in NZ
The expansion ensures that the full range of Acronis Cyber Protection Solutions will be available to partners and organisations around the world.More
Story image
How to address cyber-threats as a strategic risk
Becoming a cyber-secure organisation in the face of an evolving threat landscape requires a strategic, business-focused approach to security as opposed to a tactical approach in which security is addressed simply by implementing new tools.More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
Google Cloud observes spike in DDoS volumes in last two years
Google Cloud has seen an ‘exponential’ rise in distributed denial of service (DDoS) attacks over the past decade, but the biggest attacks have only occurred in the past couple of years.More
Story image
The three-pronged security approach that confronts security breaches head-on
Having these three processes working in tandem is key to cushioning the blow of a breach - which, if insufficiently protected, can take on average 279 days to contain and costs an average of almost US$4 million.More