New Stealthy Ad Clicking Tactics Found in Popular Apps on Google Play

New Stealthy Ad Clicking Tactics Found in Popular Apps on Google Play


May Ying TeeSoftware Engineer


Martin ZhangPrinc Software Engineer



We recently spotted a new tactic being used by apps on the Google Play Store to stealthily perform ad-clicking on users’ devices. A developer known as Idea Master has published two popular apps on the Play Store in the past year, with a collective download count of approximately 1.5 million. Symantec has informed Google of the observed behavior and the apps have now been removed from the Play Store.
The two apps, a notepad app (Idea Note: OCR Text Scanner, GTD, Color Notes) and a fitness app (Beauty Fitness: daily workout, best HIIT coach), are packed using legitimate packers originally developed to protect the intellectual property of Android applications. Android packers can change the entire structure and flow of an Android Package Kit (APK) file, which complicates things for security researchers who want to decipher the APK’s behavior. This also explains the developer’s ability to remain on the Play Store performing malicious acts under the radar for nearly a year before being detected.




Figure 1. Idea Master's apps display semi-automated ad-clicking behavior
The attack starts with a notification in the notification drawer on the user’s device.


Figure 2. The attack begins in the notification system in Android
Upon clicking on the notification, Toast is used to display a hidden view containing advertisements (Toast messages are commonly used to display unobtrusive notifications that appear on the current activity UI screen, such as when the volume is adjusted).


Figure 3. A Toast is used to display the advertisements
Unlike hidden views where the view is set to transparent in order to hide content from the user, this threat actor deploys a much more cunning way of running the advertisements while ke ..

Support the originator by clicking the read the rest link below.