20% of ad clicks on average are frauds

Don't pay for clicks generated by bots, competitors
or uninterested clickers

Tekya - the latest case of fraud involving online advertising.

TrafficWatchdog team

03.07.2020 r.

Tekya, fraud, online advertising, Check Point Research, applications, cyberattacks, ThreatCloud, malware code

Tekya - the latest case of fraud involving online advertising.

source: own elaboration

Every day there are new threats associated with online fraud, and they are becoming increasingly difficult to recognize despite very advanced security algorithms. According to Check Point, more than 50,000 devices running on Android were infected with Haken malware in February this year. Haken used 8 different, seemingly secure applications. Less than 4 months later we are dealing with a new fraud called Tekya, with a much wider range of activity.

What is Tekya and how was it detected?

Check Point Research is a research team analyzing cyberattacks data stored on ThreatCloud to stop fraudsters and at the same time provide their clients with the latest possible security. Reports and publications made available by Check Point Research reveal new cyber threats and help provide protection. This was the case here - researchers working on the Check Point Research project have discovered a new family of malware called Tekya. It has infected 56 applications and has been downloaded almost a million times worldwide.

How did Tekya get into the application?

Applications came from many different developers, which leads to the theory that the programs themselves weren’t a threat at first. Malware code was probably added to them and activated only after downloading the application, which allowed it to bypass the protective algorithms (during tests Tekya wasn't detected by VirusTotal and Google Play Protect).

Tekya malware was hidden in just a few lines of code in a programming package (SDK), commonly used by application developers around the world, so it could be easily overlooked. In addition, Tekya obfuscated the native code, which also helped to avoid detection.

How does Tekya work?

After installing the infected application, a receiver is registered on the device. It has only one goal - to load library ("libtekya.so") into the "libraries" folder in the .apk file. This allows the malware to run in the background when the user undertakes activities and log his interactions with the device, such as touch, pinching, dragging, and other user gestures. Then special software functions create and trigger touch events, imitating click - so Tekya uses Google's own MotionEvent mechanism (introduced in Android in 2019) to hide that the action itself is performed automatically. As a result, this malware can click on in-app ads and get money for it from unsuspecting advertisers. Simply put, Tekya copies users' actions by pretending to click on the ads.

In what applications did Tekya hide?

Tekya malware was found in 56 Android applications that could be downloaded from Google Play. A significant part of them were games and puzzles directed at children (24 games for children), several games for adults and various utility applications such as calculators and translation applications.

The most known applications infected by Tekya are:

  • Race in Space (downloaded over 100,000 times)

  • Let me Go (downloaded over 100,000 times)

  • Cooking Delicious (downloaded over 100,000 times)

  • Aqua War (downloaded over 50,000 times)

  • Dress Up (downloaded over 50,000 times)

  • Scientific Calculator (downloaded over 50,000 times)

  • ITranslator (downloaded over 50,000 times)

  • Transvel (downloaded over 50,000 times)

  • uTrans (downloaded over 50,000 times)

Of course, all infected applications have been removed from Google Play.

What were the consequences of Tekya's?

The Tekya scam is another online fraud involving the generation of artificial clicks, as a result of which the advertisers using advertising platforms in applications such as Google AdMob, AppLovin, Facebook and Unity were the most injured. They probably had to pay for clicks obtained as a result of Tekya, and this certainly didn't translate into more conversions and sales.

When it comes to users of infected devices, malware activity shouldn't have a big impact on them (except that their equipment was used in deception and that someone was copying their activities), although they may have noticed higher energy consumption in some applications.

Tekya is another proof that fraudsters can relatively easily earn profits from advertising fraud, especially with billing models where the advertiser pay for a click or view of an ad. Every company that uses the internet for marketing purposes must be aware of the fact that there are many online scams related to clicks and new ones are constantly emerging - hundreds of new applications get to Google Play every day, which makes it impossible to check whether each of them is secure. To ensure that your company is protected, entrepreneurs should invest in more professional protection, such as the one we offer at TrafficWatchdog.

Contact us

in order to present me a product offer and for marketing purposes. Spark DigitUP Sp. z o.o. as the Administrator, observing the provisions on the protection of personal data, has informed me of my right to access, delete, forget and transfer information, as well as rectify, supplement and limit the processing of my data in the manner arising from [Privacy Policy].

within the meaning of art. 10 paragraph 2 of the Act of July 18, 2002 on the provision of electronic services (Journal of Laws No. 144, item 1204) to the provided e-mail address and telephone number. Spark DigitUP Sp. z o.o. as the Administrator, observing the provisions on the protection of personal data, has informed me of my right to access, delete, forget and transfer informations, as well as rectify, supplement and limit the processing of my data in the manner arising from [Privacy Policy].

in relation to the phone number and email address I have provided for direct marketing purposes by Spark DigitUP Sp. z o.o., owner of the TrafficWatchdog.pl