{"id":160794,"date":"2022-10-19T11:09:58","date_gmt":"2022-10-19T18:09:58","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=160794"},"modified":"2025-06-02T23:58:08","modified_gmt":"2025-06-03T06:58:08","slug":"new-malicious-clicker-found-in-apps-installed-by-20m-users","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/","title":{"rendered":"New Malicious Clicker found in apps installed by 20M+ users"},"content":{"rendered":"<p>Authored by SangRyol Ryu<\/p>\n<p>Cybercriminals are always after illegal advertising revenue. As we have previously <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-hiddenads-malware-that-runs-automatically-and-hides-on-google-play-1m-users-affected\/\" target=\"_blank\" rel=\"noopener\">reported<\/a>, we have seen many mobile malwares masquerading as a useful tool or utility, and automatically crawling ads in the background. Recently the McAfee Mobile Research Team has identified new Clicker malware that sneaked into Google Play. In total 16 applications that were previously on Google Play have been confirmed to have the malicious payload with an assumed 20 million installations.<\/p>\n<p>McAfee security researchers notified Google and all of the identified apps are no longer available on Google Play. Users are also protected by Google Play Protect, which blocks these apps on Android. McAfee Mobile Security products detect this threat as Android\/Clicker and protect you from malware. For more information, to get fully protected, visit <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mobile.html?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security<\/a>.<\/p>\n<h2>How it works<\/h2>\n<p>The malicious code was found on useful utility applications like Flashlight (Torch), QR readers, Camara, Unit converters, and Task managers:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-160935 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx.png\" alt=\"\" width=\"493\" height=\"682\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx.png 493w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx-217x300.png 217w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx-93x129.png 93w\" sizes=\"auto, (max-width: 493px) 100vw, 493px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-160921\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx2.png\" alt=\"\" width=\"588\" height=\"690\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx2.png 588w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx2-256x300.png 256w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/dx2-110x129.png 110w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/p>\n<p>Once the application is opened, it downloads its remote configuration by executing an HTTP request. After the configuration is downloaded, it registers the FCM (Firebase Cloud Messaging) listener to receive push messages. At first glance, it seems like well-made android software. However, it is hiding ad fraud features behind, armed with remote configuration and FCM techniques.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-160907 aligncenter\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/code1.png\" alt=\"\" width=\"315\" height=\"465\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/code1.png 315w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/code1-203x300.png 203w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/code1-87x129.png 87w\" sizes=\"auto, (max-width: 315px) 100vw, 315px\" \/><\/p>\n<table class=\" aligncenter\" width=\"401\">\n<tbody>\n<tr>\n<td width=\"126\">Attribute name<\/td>\n<td width=\"275\">Known meaning of the value<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">FCMDelay<\/td>\n<td width=\"275\">Initial start hours after first installation<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">adButton<\/td>\n<td width=\"275\">Visivility of a button of Advertisement<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">adMob<\/td>\n<td width=\"275\">AdMob unit ID<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">adMobBanner<\/td>\n<td width=\"275\">AdMob unit ID<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">casOn<\/td>\n<td width=\"275\">Whether CAS library works or not<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">facebookAd<\/td>\n<td width=\"275\">FaceBook Ad ID<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">fbAdRatio<\/td>\n<td width=\"275\">Ratio of FB AD<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">googleAdRatio<\/td>\n<td width=\"275\">Ratio of AdMob<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">is<\/td>\n<td width=\"275\">Decide BootService to run or not<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">urlOpen<\/td>\n<td width=\"275\">to open popup or not when starts PowerService<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">popUrl<\/td>\n<td width=\"275\">URL for PowerService<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">popUpDelay<\/td>\n<td width=\"275\">Delay time for PowerService<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">liveUrl<\/td>\n<td width=\"275\">URL for livecheck service<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">pbeKey<\/td>\n<td width=\"275\">Key for making unique string<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">playButtonList<\/td>\n<td width=\"275\">URL for other service<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">reviewPopupDialog<\/td>\n<td width=\"275\">\u00a0&#8216;y&#8217; it shows review dialog<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">tickDelay<\/td>\n<td width=\"275\">Delay time for TickService<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">tickEnable<\/td>\n<td width=\"275\">Value of TickService enabled<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">tickRandomMax<\/td>\n<td width=\"275\">Value of TickService random delay<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">tickRandomMin<\/td>\n<td width=\"275\">Value of TickService random delay<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">tickType<\/td>\n<td width=\"275\">Set the type of TickService<\/td>\n<\/tr>\n<tr>\n<td width=\"126\">updateNotiVersion<\/td>\n<td width=\"275\">Value for showing update activity<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>The FCM message has various types of information and that includes which function to call and its parameters. The picture below shows some of FCM message history:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-160893\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/table.png\" alt=\"\" width=\"300\" height=\"287\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/table.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/table-135x129.png 135w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/table-24x24.png 24w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>When an FCM message receives and meets some condition, the latent function starts working. Mainly, it is visiting websites which are delivered by FCM message and browsing them successively in the background while mimicking user\u2019s behavior. This may cause heavy network traffic and consume power without user awareness during the time it generates profit for the threat actor behind this malware. In the picture below there is an example of the network traffic generated to get the information required to generate fake clicks and the websites visited without user\u2019s consent or interaction:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-160879\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/list.png\" alt=\"\" width=\"1045\" height=\"551\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/list.png 1045w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/list-300x158.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/list-1024x540.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/list-768x405.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/list-205x108.png 205w\" sizes=\"auto, (max-width: 1045px) 100vw, 1045px\" \/><\/p>\n<h2>Malicious components: CAS and LivePosting<\/h2>\n<p>So far, we have identified two pieces of code related to this threat. One is \u201ccom.click.cas\u201d library which focuses on the automated clicking functionality while \u201ccom.liveposting\u201d library works as an agent and runs hidden adware services:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-160865\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/folders.png\" alt=\"\" width=\"358\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/folders.png 358w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/folders-300x174.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/folders-205x119.png 205w\" sizes=\"auto, (max-width: 358px) 100vw, 358px\" \/><\/p>\n<p>Depending on the version of the applications, some have both libraries working together while other applications only have \u201ccom.liveposting\u201d library. The malware is using installation time, random delay and user presence to avoid the users from noticing these malicious acts. The malicious behavior won\u2019t start if the installation time is within an hour and during the time the user is using the device, probably to stay under the radar and avoid being detected right away:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-160851\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/losts-of-code.png\" alt=\"\" width=\"517\" height=\"205\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/losts-of-code.png 517w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/losts-of-code-300x119.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/losts-of-code-205x81.png 205w\" sizes=\"auto, (max-width: 517px) 100vw, 517px\" \/><\/p>\n<h2>Conclusion<\/h2>\n<p>Clicker malware targets illicit advertising revenue and can disrupt the mobile advertising ecosystem. Malicious behavior is cleverly hidden from detection. Malicious actions such as retrieving crawl URL information via FCM messages start in the background after a certain period of time and are not visible to the user.<\/p>\n<p>McAfee Mobile Security detects and removes malicious applications like this one that may run in the background without user\u2019s knowledge. Also, we recommend having a security software installed and activated so you will be notified of any mobile threats present on your device in a timely manner. Once you remove this and other malicious applications, you can expect an extended battery time and you will notice reduced mobile data usage while ensuring that your sensitive and personal data is protected from this and other types of threats.<\/p>\n<h2>IoCs (Indicators of Compromise)<\/h2>\n<p>liveposting[.]net<\/p>\n<p>sideup[.]co[.]kr<\/p>\n<p>msideup[.]co[.]kr<\/p>\n<p>post-blog[.]com<\/p>\n<p>pangclick[.]com<\/p>\n<p>modooalba[.]net<\/p>\n<p>&nbsp;<\/p>\n<table width=\"624\">\n<tbody>\n<tr>\n<td width=\"296\">SHA256<\/td>\n<td width=\"165\">Package name<\/td>\n<td width=\"114\">Name<\/td>\n<td width=\"49\">Downloaded<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">a84d51b9d7ae675c38e260b293498db071b1dfb08400b4f65ae51bcda94b253e<\/td>\n<td width=\"165\">com.hantor.CozyCamera<\/td>\n<td width=\"114\">High-Speed Camera<\/td>\n<td width=\"49\">10,000,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">00c0164d787db2ad6ff4eeebbc0752fcd773e7bf016ea74886da3eeceaefcf76<\/td>\n<td width=\"165\">com.james.SmartTaskManager<\/td>\n<td width=\"114\">Smart Task Manager<\/td>\n<td width=\"49\">5,000,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">b675404c7e835febe7c6c703b238fb23d67e9bd0df1af0d6d2ff5ddf35923fb3<\/td>\n<td width=\"165\">kr.caramel.flash_plus<\/td>\n<td width=\"114\">Flashlight+<\/td>\n<td width=\"49\">1,000,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">65794d45aa5c486029593a2d12580746582b47f0725f2f002f0f9c4fd1faf92c<\/td>\n<td width=\"165\">com.smh.memocalendar<\/td>\n<td width=\"114\">\ub2ec\ub825\uba54\ubaa8\uc7a5<\/td>\n<td width=\"49\">1,000,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">82723816760f762b18179f3c500c70f210bbad712b0a6dfbfba8d0d77753db8d<\/td>\n<td width=\"165\">com.joysoft.wordBook<\/td>\n<td width=\"114\">K-Dictionary<\/td>\n<td width=\"49\">1,000,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">b252f742b8b7ba2fa7a7aa78206271747bcf046817a553e82bd999dc580beabb<\/td>\n<td width=\"165\">com.kmshack.BusanBus<\/td>\n<td width=\"114\">BusanBus<\/td>\n<td width=\"49\">1,000,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">a2447364d1338b73a6272ba8028e2524a8f54897ad5495521e4fab9c0fd4df6d<\/td>\n<td width=\"165\">com.candlencom.candleprotest<\/td>\n<td width=\"114\">Flashlight+<\/td>\n<td width=\"49\">500,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">a3f484c7aad0c49e50f52d24d3456298e01cd51595c693e0545a7c6c42e460a6<\/td>\n<td width=\"165\">com.movinapp.quicknote<\/td>\n<td width=\"114\">Quick Note<\/td>\n<td width=\"49\">500,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">a8a744c6aa9443bd5e00f81a504efad3b76841bbb33c40933c2d72423d5da19c<\/td>\n<td width=\"165\">com.smartwho.SmartCurrencyConverter<\/td>\n<td width=\"114\">Currency Converter<\/td>\n<td width=\"49\">500,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">809752e24aa08f74fce52368c05b082fe2198a291b4c765669b2266105a33c94<\/td>\n<td width=\"165\">com.joysoft.barcode<\/td>\n<td width=\"114\">Joycode<\/td>\n<td width=\"49\">100,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">262ad45c077902d603d88d3f6a44fced9905df501e529adc8f57a1358b454040<\/td>\n<td width=\"165\">com.joysoft.ezdica<\/td>\n<td width=\"114\">EzDica<\/td>\n<td width=\"49\">100,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">1caf0f6ca01dd36ba44c9e53879238cb46ebb525cb91f7e6c34275c4490b86d7<\/td>\n<td width=\"165\">com.schedulezero.instapp<\/td>\n<td width=\"114\">Instagram Profile Downloader<\/td>\n<td width=\"49\">100,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">78351c605cfd02e1e5066834755d5a57505ce69ca7d5a1995db5f7d5e47c9da1<\/td>\n<td width=\"165\">com.meek.tingboard<\/td>\n<td width=\"114\">Ez Notes<\/td>\n<td width=\"49\">100,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">4dd39479dd98124fd126d5abac9d0a751bd942b541b4df40cb70088c3f3d49f8<\/td>\n<td width=\"165\">com.candlencom.flashlite<\/td>\n<td width=\"114\">\uc190\uc804\ub4f1<\/td>\n<td width=\"49\">1,000+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">309db11c2977988a1961f8a8dbfc892cf668d7a4c2b52d45d77862adbb1fd3eb<\/td>\n<td width=\"165\">com.doubleline.calcul<\/td>\n<td width=\"114\">\uacc4\uc0b0\uae30<\/td>\n<td width=\"49\">100+<\/td>\n<\/tr>\n<tr>\n<td width=\"296\">bf1d8ce2deda2e598ee808ded71c3b804704ab6262ab8e2f2e20e6c89c1b3143<\/td>\n<td width=\"165\">com.dev.imagevault<\/td>\n<td width=\"114\">Flashlight+<\/td>\n<td width=\"49\">100+<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many&#8230;<\/p>\n","protected":false},"author":695,"featured_media":160460,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-160794","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Malicious Clicker found in apps installed by 20M+ users | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Malicious Clicker found in apps installed by 20M+ users | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-19T18:09:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T06:58:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"308\" \/>\n\t<meta property=\"og:image:height\" content=\"208\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"New Malicious Clicker found in apps installed by 20M+ users\",\"datePublished\":\"2022-10-19T18:09:58+00:00\",\"dateModified\":\"2025-06-03T06:58:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\"},\"wordCount\":1075,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\",\"name\":\"New Malicious Clicker found in apps installed by 20M+ users | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png\",\"datePublished\":\"2022-10-19T18:09:58+00:00\",\"dateModified\":\"2025-06-03T06:58:08+00:00\",\"description\":\"Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png\",\"width\":308,\"height\":208},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"New Malicious Clicker found in apps installed by 20M+ users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Malicious Clicker found in apps installed by 20M+ users | McAfee Blog","description":"Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"New Malicious Clicker found in apps installed by 20M+ users | McAfee Blog","og_description":"Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-10-19T18:09:58+00:00","article_modified_time":"2025-06-03T06:58:08+00:00","og_image":[{"width":308,"height":208,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"New Malicious Clicker found in apps installed by 20M+ users","datePublished":"2022-10-19T18:09:58+00:00","dateModified":"2025-06-03T06:58:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/"},"wordCount":1075,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/","name":"New Malicious Clicker found in apps installed by 20M+ users | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png","datePublished":"2022-10-19T18:09:58+00:00","dateModified":"2025-06-03T06:58:08+00:00","description":"Authored by SangRyol Ryu Cybercriminals are always after illegal advertising revenue. As we have previously reported, we have seen many mobile malwares","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Guide-Protecting-Your-Digital-Identity.png","width":308,"height":208},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-malicious-clicker-found-in-apps-installed-by-20m-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"New Malicious Clicker found in apps installed by 20M+ users"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/160794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=160794"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/160794\/revisions"}],"predecessor-version":[{"id":215001,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/160794\/revisions\/215001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/160460"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=160794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=160794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=160794"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=160794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}