New Android malware uses AI to click on hidden browser ads
Recorded: Jan. 21, 2026, 11:03 p.m.
| Original | Summarized |
New Android malware uses AI to click on hidden browser ads News Featured Credential-stealing Chrome extensions target enterprise HR platforms Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Jordanian pleads guilty to selling access to 50 corporate networks Ingram Micro says ransomware attack affected 42,000 people Chainlit AI framework bugs let hackers breach cloud environments Cisco fixes Unified Communications RCE zero day exploited in attacks New Android malware uses AI to click on hidden browser ads Online retailer PcComponentes says data breach claims are fake Tutorials Latest How to access the Dark Web using the Tor Browser How to enable Kernel-mode Hardware-enforced Stack Protection in Windows 11 How to use the Windows Registry Editor How to backup and restore the Windows Registry How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows Webinars Latest Qualys BrowserCheck STOPDecrypter AuroraDecrypter FilesLockerDecrypter AdwCleaner ComboFix RKill Junkware Removal Tool Deals Categories eLearning IT Certification Courses Gear + Gadgets Security VPNs Popular Best VPNs How to change IP address Access the dark web safely Best VPN for YouTube Forums Virus Removal Guides HomeNewsSecurityNew Android malware uses AI to click on hidden browser ads New Android malware uses AI to click on hidden browser ads By Bill Toulas January 21, 2026 A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact with specific advertisement elements. Researchers at mobile security company Dr.Web found that the new family of Android trojans is distributed through GetApps, the official app store for Xiaomi devices. One of the malicious apps on Xiaomi's app storeSource: Doctor Web Click-fraud trojans on TelegramSource: Doctor Web The 2026 CISO Budget Benchmark Related Articles: Ad Fraud Bill Toulas Previous Article Post a Comment Community Rules You need to login in order to post a comment You may also like: Popular Stories Microsoft releases OOB Windows updates to fix shutdown, Cloud PC bugs Ingram Micro says ransomware attack affected 42,000 people New PDFSider Windows malware deployed on Fortune 100 firm's network Sponsor Posts Identity Governance & Threat Detection in one: Get a guided tour of our platform Discover how phishing kits are sold and deployed. Download the full research report. Discover how to scale IT infrastructure reliably without adding toil or burnout. Upcoming Webinar Follow us: Main Sections News Community Forums Useful Resources Welcome Guide Company About BleepingComputer Terms of Use - Privacy Policy - Ethics Statement - Affiliate Disclosure Copyright @ 2003 - 2026 Bleeping Computer® LLC - All Rights Reserved Login Username Password Remember Me Sign in anonymously Sign in with Twitter Not a member yet? Register Now Help us understand the problem. What is going on with this comment? Spam Abusive or Harmful Inappropriate content Strong language Other Read our posting guidelinese to learn what content is prohibited. Submitting... |
This report details a new family of Android malware utilizing artificial intelligence, specifically TensorFlow.js, to engage in click-fraud activities. The malware, distributed through Xiaomi’s GetApps store and third-party APK sites like Apkmody and Moddroid, employs a sophisticated technique involving hidden WebViews and image analysis. The core of the operation relies on a ‘phantom’ mode, where a hidden browser analyzes screenshots to identify and click on dynamic advertisement elements. Another mode, ‘signalling,’ uses WebRTC to stream a live video feed of the browser screen, allowing attackers to control actions in real-time. The threat actor initially created malicious versions of popular games, including *Theft Auto Mafia*, *Cute Pet House*, *Creation Magic World*, *Amazing Unicorn Party*, *Open World Gangsters*, and *Sakura Dream Academy*. The distribution extended beyond these games, encompassing modified versions of popular apps like Spotify, YouTube, Deezer, and Netflix via Moddroid’s “Editor’s Choice” page, and through Telegram channels and a Discord server with 24,000 subscribers promoting an infected Spotify app called Spotify X. The effectiveness of these apps is notable as they "actually work," lessening user suspicion. The malware’s stealthy operation is facilitated by its use of hidden WebViews rendering content on a virtual screen, making malicious activity undetectable to the user. The primary impacts of this click-fraud tactic extend beyond immediate privacy and data compromises, manifesting as battery drain and increased mobile data consumption. The report highlights the growing sophistication of cybercriminal techniques, moving beyond traditional script-based methods to incorporate machine learning for adaptive fraud detection and execution. The findings underscore the importance of caution when installing apps outside of official app stores, especially modified versions of popular applications offering enhanced features or premium access. The research was conducted by Doctor Web, a mobile security company. |