Is it possible there’s an exploit to remotely touch, which at first looked random, but as people figured it out learned to actually operate the device?
let's imagine that that's the case.
imagine that you are the attacker that figured that out, what are you going to do?
start attacking random people with random clicks on their screen or keep it in private until you figure out details how to make it useful?
thats why this sound like some kind of hardware malfunction (or some substance on touch screen - I personally experienced ghost touches on my phone from dirty screen) or it's some kind of prank by kids using some flipper and previously authorized device or something similar