Article Details
Scrape Timestamp (UTC): 2026-01-21 22:12:23.990
Original Article Text
Click to Toggle View
New Android malware uses AI to click on hidden browser ads. A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact with specific advertisement elements. The mechanism relies on visual analysis based on machine learning instead of predefined JavaScript click routines, and does not involve script-based DOM-level interaction like classic click-fraud trojans. The threat actor is using TensorFlow.js, an open-source library developed by Google for training and deploying machine learning models in JavaScript. It permits running AI models in browsers or on servers using Node.js. Researchers at mobile security company Dr.Web found that the new family of Android trojans is distributed through GetApps, the official app store for Xiaomi devices. They discovered that the malware can operate in a mode called 'phantom', which uses a hidden WebView-based embedded browser to load a target page for click-fraud and a JavaScript file. The script's purpose is to automate actions on the ads shown on the loaded site. After loading the trained model from a remote server, the hidden browser is placed on a virtual screen, and screenshots are taken for TensorFlow.js to analyze and identify relevant elements. By tapping on the correct UI element, the malware reproduces normal activity from a user. This method is more effective and resilient against modern ad variability, as most of these ads are dynamic, frequently change structure, and often use iframes or video. A second mode, called 'signalling', uses WebRTC to stream a live video feed of the virtual browser screen to the attackers, allowing them to perform real-time actions like tapping, scrolling, and entering text. The threat actor distributes the malware in games on Xiaomi’s GetApps software catalogue. Initially, the apps are submitted without malicious functionality and receive the malicious components in subsequent updates. Some of the infected games identified by Doctor Web are: In addition to the Xiaomi-hosted apps, the trojans are distributed via third-party APK sites (e.g., Apkmody and Moddroid, altered versions, the so-called mods, of the original Spotify, YouTube, Deezer, and Netflix apps. The researchers say that most apps on Moddroid’s “Editor’s Choice” page are infected. Infected APK files are also distributed through Telegram channels, some app examples including Spotify Pro, Spotify Plus – Official, Moddroid.com, and Apkmody Chat. Dr.Web also found a Discord server with 24,000 subscribers pushing an infected app called Spotify X. The researchers note that at least some of these apps "actually work," which reduces users’ suspicion. Combined with the fact that click fraud is executed covertly in a hidden WebView rendering content on a virtual screen, this means that the victims will see no indication of the malicious activity. Although clickjacking and ad fraud aren’t immediate threats to the user’s privacy and data, they are a lucrative cybercriminal activity. The direct impact on the user is battery drainage and premature degradation, and increased mobile data charges. Android users are advised to avoid installing apps outside Google Play, especially alternative versions for popular apps that promise extra features or free access to premium subscriptions. Secrets Security Cheat Sheet: From Sprawl to Control Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start. Get the cheat sheet and take the guesswork out of secrets management.
Daily Brief Summary
A new Android malware family uses TensorFlow machine learning to execute click fraud by interacting with hidden browser ads, bypassing traditional JavaScript routines.
The malware employs TensorFlow.js, enabling AI models to run in browsers, enhancing its adaptability to dynamic ad environments.
Distributed through Xiaomi's GetApps and third-party sites, the malware initially appears benign, receiving malicious updates post-installation.
The trojans operate in 'phantom' and 'signalling' modes, using virtual screens and live video feeds to automate ad interactions and mimic user behavior.
Infected apps include altered versions of popular apps like Spotify and Netflix, distributed via APK sites and Telegram channels, increasing their reach.
While the malware does not directly threaten user privacy, it leads to battery drain, device wear, and higher data charges, impacting user experience.
Users are advised to avoid non-Google Play app installations and be cautious of apps offering free premium features to mitigate risks.