Home > Cyber News > Porn Clicker Trojan Hides in Google Play Apps, Check Your Android
CYBER NEWS

Porn Clicker Trojan Hides in Google Play Apps, Check Your Android

Play-StoreMalware creators often use porn applications to spread malicious code across users’ mobile and desktop devices. Often, Google Play is also included in such scenarios, in which click-jacking mobile malware is used to make quick income for affiliates. The operating system mostly affected by these schemes is Android.

Porn Clicker Silently Takes Over Users’ Devices

That being sad, researchers from ESET have run into an interesting piece of malicious code, a Trojan, that doesn’t collect private information or download malware to the compromised Android devices. Instead, Porn Clicker, as researchers dubbed the threat, clicks on advertisements featured on porn websites without the user’s approval or knowledge. In other words, Porn Clicker is indeed a click-jacking mobile threat that is operating surreptitiously.

Mobile Threats: Acerard Banking Trojan

Porn Clicker pretends to be a popular mobile application in Google Play, be it Candy Crush, GTA, Subway Surfers, etc. To avoid downloading suspicious applications, the user should always look for the signs. Such apps usually have a number of negative reviews. Unfortunately, crooks know that, and repackage the malware over and over again.

That is why another must-do inspection for the user is carefully checking the app’s developer. Is it legitimate, or does it look suspicious and untrustworthy?

Third-party Stores Also Used to Spread Porn Clicker

Furthermore, researchers believe that Trojans such as this particular Porn Clicker can go unnoticed for a long time simply because they feature implemented antivirus checks. After installation and before running on the device, the Trojan performs a check for the presence of a range list of widely used mobile security apps. If such is found, the Trojan won’t be triggered.

In addition, researchers say that not all of the malicious apps were hosted on Google Play, and that third-party stores were likely used. 187 applications, associated with the Porn Clicker, were discovered aside from the ones featured on Google Play.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree