Some iOS Apps Found To Have Clicker Trojan Malware

November 9, 2019

Written by wukovits

some ios apps found to have clicker trojan malwareRecently, a survey of Apple’s App Store by Wandera Threat Lab discovered more than a dozen iOS apps that have been infected with the ‘Clicker’ Trojan malware.  As malware goes, this variant isn’t especially dangerous to those who wind up infected with it, but it’s still problematic.

A spokesman for Wandera had this to say about the recent discovery:

“The objective of most clicker trojans is to generate revenue for the attacker on a pay-per-click basis by inflating website traffic.  They can also be used to drain the budget of a competitor by artificially inflating the balance owed to the ad network.”

All of the infected apps come from AppAspect Technologies, Pvt. Ltd. They are a company based in India with more than fifty different apps available on Apple’s App Store and more than two dozen available on Google’s Play Store.  What can’t be determined is whether the malicious code was injected into these apps unintentionally by making use of a compromised third-party framework, or if it was an intentional decision.

Again, from the researchers at Wandera:

“This discovery is the latest in a series of bad apps being surfaced on an official mobile app store and anther proof point that malware does impact the iOS ecosystem.  Mobile malware is still one of the less frequently seen threats in the wild, but we are seeing it used more in targeted attack scenarios.”

The Wandera researchers concluded their report with a recommendation. They suggest that all mobile users (whether they are in the Android or iOS ecosystems) make use of mobile security solutions that keep malicious apps from communicating with their command and control servers. This serves as a means of protecting their data from being stolen.  It’s good advice, and these types of threats are certainly something to keep a watchful eye out for.

Used with permission from Article Aggregator

Bayou Tech

We provide solutions for your business. Find out how we can help.

Related Articles

Key Considerations for Effective Cybersecurity Implementation

Consider this: In the realm of cybersecurity, things often get tangled in the web of "you should do it anyway" arguments. Yet, for busy business owners bombarded with daily "must-dos," deciphering the essentials from the fluff can feel like a cyber maze. We aim to...

Major Cyber Attack at OMV

Louisiana’s Office of Motor Vehicles (OMV) is one of a still undetermined number of government entities, major businesses, and organizations to be affected by an unprecedented Data Breach.There is no indication at this time that cyber attackers who breached MOVEit...