A pair of campaigns designed to spread ad fraud malware through supposedly innocuous Android applications generated between 8.5 million and 36.5 million downloads before Google removed the apps from its online store, Check Point Software Technologies has reported.
Oddly, the first campaign involved a seemingly official Korean developer company called Kiniwini, which is registered on Google Play as ENISTUDIO corp. "It is quite unusual to find an actual organisation behind mobile malware, as most of them are developed by purely malicious actors," Check Point noted in its post. Kiniwini created 41 apps that harboured the July malware, which collectively generated between 4.5 and 18 million downloads. Some of these apps existed for years, but they were all recently updated, suggesting that malicious code could have been recently added – but not necessarily.
The second campaign features apps created by a different developer, which may or may not have a connection with Kiniwini. These apps, the oldest of which was last updated in April 2016, were downloaded between four and 18 million times, according to Check Point, which alerted Google of the click fraud campaigns.
Check Point, which likened the campaign to one that recently spread FalseGuide malware, notes that the culprits were able to bypass Google Play's protections by hackers by creating a "seemingly benign bridgehead app, meant to establish connection to the victim's device, and insert[ing] it into the app store."