Incident: Malicious Auto-Clicker Malware Found in Google Play Store Apps

Published Date: 2020-03-24

Postmortem Analysis
Timeline 1. The software failure incident of hidden auto-clicker malware in utility and children's apps in the Google Play Store happened when Check Point researchers discovered it and disclosed their findings to Google earlier this month [97209]. 2. Published on 2020-03-24 07:00:00+00:00. 3. The software failure incident of hidden auto-clicker malware in utility and children's apps in the Google Play Store occurred in March 2020.
System The systems that failed in the software failure incident reported in Article 97209 are: 1. Google Play Store 2. Google's anti-malware scanner Play Protect
Responsible Organization 1. The developers of the 56 apps containing the Tekya malware were responsible for causing the software failure incident [97209].
Impacted Organization 1. Users who installed the infected apps from the Google Play Store were impacted by the software failure incident [97209].
Software Causes 1. The software cause of the failure incident was the presence of hidden auto-clicker malware, dubbed Tekya, in a host of utility and children's apps in the Google Play Store [97209].
Non-software Causes 1. Lack of thorough vetting process by Google Play Store for detecting malware-infected apps [97209] 2. Insufficient security measures in place to prevent the infiltration of malicious apps into the Google Play Store [97209]
Impacts 1. The impacted apps contained hidden auto-clicker malware, leading to ad fraud by automatically clicking on ads and banners [97209]. 2. Over a million installs across Android devices were affected by the malware-infected apps [97209]. 3. The malware went undetected by Google Play Store and Google's anti-malware scanner Play Protect, indicating a failure in the security measures [97209]. 4. Users were advised to uninstall the infected apps immediately and update their Android devices with the latest security patches and operating system version to mitigate the impact of the incident [97209].
Preventions 1. Implementing stricter app review processes by Google Play Store to detect malicious behavior in apps before they are published [97209]. 2. Enhancing Google's anti-malware scanner Play Protect to better detect sophisticated malware like Tekya [97209]. 3. Increasing user awareness about the risks of downloading apps from unknown sources and the importance of regularly updating devices with security patches [97209].
Fixes 1. Implementing stricter app review processes by Google Play Store to detect and prevent the inclusion of malware-infected apps [97209]. 2. Enhancing Google's anti-malware scanner Play Protect to better detect sophisticated malware like Tekya [97209]. 3. Regularly updating Android devices with the latest Google security patches and operating system versions to mitigate the risk of malware infections [97209].
References 1. Security firm Check Point [97209]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization (a) The software failure incident of hidden auto-clicker malware being present in apps on the Google Play Store is an example of a recurring issue within the same organization, Google. The incident involved a new family of malware called Tekya that went undetected by Google Play Store and Google's anti-malware scanner Play Protect [97209]. This highlights a potential gap in Google's security measures, indicating that similar incidents have happened before within the organization.
Phase (Design/Operation) design, operation (a) The software failure incident in Article 97209 can be attributed to the design phase. The hidden auto-clicker malware, named Tekya, was embedded in various utility and children's apps available on the Google Play Store. This malware imitated user actions to automatically click ads and banners, leading to ad fraud. The malware managed to evade detection by Google Play Store and Google's anti-malware scanner Play Protect, indicating a failure in the design aspect of the security measures in place [97209]. (b) The software failure incident in Article 97209 can also be linked to the operation phase. Users unknowingly downloaded and installed these infected apps from the Google Play Store, which were then used to commit ad fraud through auto-clicking on ads and banners. This highlights a failure in the operation phase, as users inadvertently contributed to the success of the malware by installing and using the compromised apps [97209].
Boundary (Internal/External) within_system, outside_system (a) within_system: The software failure incident of hidden auto-clicker malware in multiple apps on the Google Play Store was due to the malware, dubbed Tekya, imitating user actions to automatically click ads and banners, leading to ad fraud. This failure originated from within the system as the malware was present within the apps themselves, bypassing Google Play Store's security measures and anti-malware scanner [97209]. (b) outside_system: The failure could also be attributed to factors outside the system, such as the malicious actors who successfully infiltrated the Google Play Store with these infected apps. Despite Google's security measures, the actors managed to distribute the malware-containing apps to users, highlighting the challenge of ensuring the safety of every application on the Play Store [97209].
Nature (Human/Non-human) non-human_actions (a) The software failure incident in this case was due to non-human actions. The malware named Tekya was designed to imitate user actions to automatically click ads and banners, leading to ad fraud. This hidden auto-clicker malware was present in various utility and children's apps in the Google Play Store, affecting over a million installs across Android devices [97209].
Dimension (Hardware/Software) software (a) The software failure incident in Article 97209 was not attributed to hardware issues. The incident was related to a new family of malware called Tekya that was found in various apps on the Google Play Store, leading to ad fraud by automatically clicking ads and banners [97209]. (b) The software failure incident in Article 97209 was due to contributing factors originating in software. The malware, Tekya, imitated user actions to automatically click ads and banners, indicating a software-related issue of malicious code infiltrating legitimate apps on the Google Play Store [97209].
Objective (Malicious/Non-malicious) malicious (a) The objective of the software failure incident was malicious. The incident involved hidden auto-clicker malware named Tekya, which imitated user actions to automatically click ads and banners in order to commit ad fraud. This malware was found in various utility and children's apps in the Google Play Store, with over a million installs across Android devices. The malware went undetected by Google Play Store and Google's anti-malware scanner Play Protect, indicating a deliberate attempt to deceive users and generate revenue through fraudulent ad clicks [97209].
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident in this case was related to poor_decisions. The malware found in a host of utility and children's apps in the Google Play Store was designed to automatically click ads and banners to commit ad fraud. This malicious activity was intentionally embedded in the apps by the developers with the aim of generating revenue through fraudulent means [97209].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident in Article 97209 can be attributed to development incompetence. The incident involved a family of malware named Tekya that was found in multiple apps on the Google Play Store, including apps for children and utility apps. The malware imitated user actions to automatically click ads and banners, leading to ad fraud. Despite the presence of this malware, it went undetected by Google Play Store and Google's anti-malware scanner Play Protect during the research conducted by security firm Check Point. This indicates a lack of professional competence in ensuring the security and integrity of the apps available on the Google Play Store [97209]. (b) The software failure incident in Article 97209 does not seem to be accidental. The presence of the hidden auto-clicker malware in various apps, the deliberate action to imitate user behavior for ad fraud, and the fact that the malware went undetected by Google's security measures suggest a deliberate and malicious intent behind the incident rather than it being accidental [97209].
Duration temporary (a) The software failure incident in this case can be considered temporary. The incident involved the presence of hidden auto-clicker malware in various apps on the Google Play Store, which led to ad fraud. The malware was detected by researchers at security firm Check Point, who then disclosed their findings to Google. Subsequently, Google removed the infected apps from the Play Store. This indicates that the failure was temporary as it was actively addressed and mitigated by the removal of the malicious apps [97209].
Behaviour value, other (a) crash: The software failure incident in the article does not involve a crash where the system loses state and does not perform any of its intended functions. The malware found in the apps imitates user actions to automatically click ads and banners, indicating that the apps were still functioning but with malicious behavior [97209]. (b) omission: The software failure incident does not involve omission where the system omits to perform its intended functions at an instance(s). The malware in the apps was actively engaging in ad fraud by automatically clicking ads and banners, indicating that the intended functions were being carried out, albeit in a malicious manner [97209]. (c) timing: The software failure incident does not involve timing issues where the system performs its intended functions correctly but too late or too early. The malware in the apps was designed to imitate user actions to click ads and banners, indicating that the intended functions were being performed, albeit in a fraudulent manner [97209]. (d) value: The software failure incident involves a failure due to the system performing its intended functions incorrectly. The malware, named Tekya, imitates user actions to automatically click ads and banners in order to commit ad fraud. This behavior is not the intended function of the apps, indicating incorrect behavior [97209]. (e) byzantine: The software failure incident does not involve a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. The malware found in the apps consistently imitated user actions to click ads and banners for ad fraud purposes, showing a consistent pattern of behavior [97209]. (f) other: The software failure incident involves a behavior where the system is functioning with hidden auto-clicker malware that imitates user actions to automatically click ads and banners, leading to ad fraud. This behavior falls under the category of malicious activity rather than a typical software failure like a crash or omission [97209].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property The consequence of the software failure incident reported in the article is primarily related to (d) property. The hidden auto-clicker malware discovered in various apps on the Google Play Store aimed to commit ad fraud by automatically clicking ads and banners, potentially leading to financial losses for advertisers [97209].
Domain information (a) The software failure incident reported in Article 97209 is related to the industry of information. The incident involved a host of utility and children's apps in the Google Play Store that contained hidden auto-clicker malware, affecting more than a million installs across Android devices [97209]. The malware, named Tekya, imitated user actions to automatically click ads and banners, leading to ad fraud. This incident highlights the vulnerability of apps in the information industry to malware attacks and the importance of ensuring the security of software applications in this sector.

Sources

Back to List