Monday, April 28, 2025
HomeAdwareAuto Clicking "GhostClicker" Playstore Android Adware Found in 340 Apps with...

Auto Clicking “GhostClicker” Playstore Android Adware Found in 340 Apps with 5 Million Downloads

Published on

SIEM as a Service

Follow Us on Google News

Auto Clicking Android Adware called “GhostClicker” Found in Google Play Store from 340 Android Apps Especially “Aladdin’s Adventure’s World” game which contains same auto Clicking Adware was Downloaded more than 5 Millions times.

Current scenario revealed that, Android Platform is one of the biggest Target for Cyber Criminals to Steal personal information and bank details across the Goble.

The Auto Clicking adware was discovered with many embedded Android Apps that belongs to QR and barcode scanners, multimedia recorders and players, device charger, GPS/navigation-related apps

- Advertisement - Google News
Adware

Aladdin’s Adventure’s World Infected Game

This Auto Clicing GhostClicker Adware Infected Many Countries including Brazil, Japan, Taiwan, Russia, Italy, and the U.S.

According to Trend Mircro,this adware as GhostClicker (ANDROIDOS_GHOSTCLICKER.AXM) given its auto-click routine and the way it hides itself in Google Mobile Services (GMS), the set of Google’s most popular applications and application program interfaces (APIs).

GhostClicker Also Abuse and hide its code into Facebook Ad’s software development kit (SDK) and It embeds itself into these two services (GMS, SDK) with the name called “logs“.

Also Read  :  Dangerous Android Banking Trojan Control Mobile Devices and Steals Confidential Bank Customers Information

How Does GhostClicker Work

MajoY Motivation of this Malicious Adware is to Generate more revenue from Ads Campaign by Generating Fake Traffic.

GhostClicker using the Technique that performs to insert the code Directly into Google-owned mobile advertising platform called Admob for getting the ad’s location.

Once gathered the information about the Device dimensions that it calculates the appropriate XY coordinates then uses the dispatch touche vent API to simulate clicking.

Adware

Inserting code to get AdMob’s Context View

It used to retrieve the Device Property by using the infected App after it launched which is used to configure the User-Agent string in Android devices.(http.agent).

Some of the GhostClicker-embedded apps requested Device Permission without Declaring the security policy such as wiping data and resetting password.

This Permission Technique leads to taking many Process to uninstall by users to removing the infected app.

It popups in other Apps which Displaying with  Download link of the Google play store and Generating more Revenue by this Malicious activities.

Also, It opens a YouTube video link in the device’s browser via communication with its command and control (C&C) server.

Adware

dispatchTouchEvent API for Auto Click

GhostClicker using the dispatchTouchEvent API to automatically click the ad and Generate the revenue.

Finally, GhostClicker will perform the Auto Click the Ads Each and Every in victims Mobile.

Image Source :Trend Micro
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cybercriminals Selling Sophisticated HiddenMiner Malware on Dark Web Forums

Cybercriminals have begun openly marketing a powerful new variant of the HiddenMiner malware on...

Three IXON VPN Client Vulnerabilities Let Attackers Escalate Privileges

Security researchers at Shelltrail have discovered three significant vulnerabilities in the IXON VPN client...

Cybersecurity Firm CEO Arrested for Planting Malware in Hospital Systems

Jeffrey Bowie, the CEO of a local cybersecurity firm, has been arrested for allegedly...

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

6 Best Ad Blockers for Android Devices in 2024 to Stop Annoying Ads

Ad-blocking software is one of the most convenient types of software available, helping users...

How does an ad blocker apk work & How does it protect your information?

Did you know that the average Internet user sees about 7,000 advertisements per day?...

Beware!! New Ad-Blocking Chrome Extension That Injects Malicious Ads

A new malicious browser extension, known as AllBlock has been detected to be injecting...