Researchers at Check Point have detected an auto-clicker malware that was active within Google’s Play Store. The malware, named Tekya, performs mobile ad fraud by imitating the actions of a phone owner, tapping adverts and banners from ad agencies like Google’s AdMob, AppLovin, Facebook and Unity.

It was seen in more than 56 applications and was downloaded over one million times worldwide. 24 of the infected applications targeted kids, ranging from puzzle games to racing games. The rest of the infected applications was aimed at utility applications like cooking, calculator, download and translator apps.

READ ALSO: Huawei, Xiaomi, Oppo & Vivo unite to compete Google Play Store

Check Point’s manager of mobile research, Aviran Hazum had this to say, “To us, the amount of applications targeted and the sheer number of downloads that the actor successfully infiltrated into Google Play is staggering.”

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.