Android Malware Detected Using Machine Learning to Automatically Detect and Click on Ads

The malware can switch to a signalling mode that allows attackers to manually scroll and tap through a live stream of the virtual screen.

Android Malware Detected Using Machine Learning to Automatically Detect and Click on Ads

Photo Credit: Unsplash/ NordWood Themes

The malware is reportedly mainly spread through Android apps or games

Click Here to Add Gadgets360 As A Trusted Source As A Preferred Source On Google
Highlights
  • AI-powered malware adapts to changing ad formats on Android
  • Malware uses TensorFlow to click ads without user interaction
  • Hidden browser mode lets malware run ad fraud in the background
Advertisement

Android users are being warned about a new and more advanced form of mobile malware that quietly uses machine learning technology to generate ad clicks in the background. Unlike earlier threats that relied on predictable scripts, this malware adapts to different ad formats and operates in a hidden mode, making detection harder. Security researchers say the threat was detected in apps on an OEM's app store, as well as websites that host APKs for third-party Android apps.

Security Researchers Warn of AI-Based Android Malware Targeting Ad Networks

According to a Dr. Web report, security researchers have uncovered a new Android malware strain that uses an open-source machine learning library from Google to secretly generate ad clicks, highlighting the increasing sophistication of mobile threats.

Unlike traditional ad fraud tools that rely on fixed scripts, this malware uses Google's TensorFlow.js library to analyse visual elements on the screen. When an advertisement appears inside an app or game, it identifies clickable areas and interacts with them automatically. This lets the malware adapt to changing ad formats, layouts, and placements, including dynamically embedded ads.

The report adds that the malware can operate in a hidden “phantom” mode, where it launches a hidden WebView where ads are loaded and receive clicks entirely in the background. This inflates the click-through rates without any visible signs on the device. As a result, users may only notice indirect effects such as increased battery drain, higher data usage, or slower performance.

If automated interactions fail, the malware can switch to a signalling mode that allows attackers to manually control actions like scrolling and tapping using a WebRTC-based signalling mode, according to the researchers.

The report claimed that the malware is mainly spread through casual Android games. Several infected apps were found on Xiaomi's GetApps store, often after being updated with malicious components following initial approval. Infected apps have also circulated on third-party APK platforms such as Apkmody and Moddroid, as well as Telegram channels that distribute modified versions of popular apps.

To reduce the risk of malware, users are advised to avoid installing apps from unofficial sources, review recently downloaded games, enable Google Play Protect, and regularly audit app permissions. Keeping devices updated and running security scans can also help limit exposure to AI-driven mobile threats.

Comments

Catch the latest from the Consumer Electronics Show on Gadgets 360, at our CES 2026 hub.

Sucharita Ganguly
Sucharita is a writer with Gadgets 360 and is mostly found playing with her cat in her free time. She has previously worked at breaking news desks across organizations. Powered by coffee, The Beatles, Bowie, and her newfound love for BTS, she aims to work towards contributing to a better media environment for women and queer folk. More
Samsung Accepts Liability, Offers Compensation After Galaxy S25+ Explodes While Charging
Apple Could Run AI-Powered Siri Chatbot on Google Cloud, AI Chips: Report

Advertisement

Follow Us

Advertisement

© Copyright Red Pixels Ventures Limited 2026. All rights reserved.
Trending Products »
Latest Tech News »