Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Google Disrupts 224-Android Malware Apps Behind $2.3 Billion Ad Fraud Campaign Dubbed "SlopAds"


Google has disrupted a massive Android ad fraud campaign dubbed "SlopAds" that involved 224 malicious apps generating $2.3 billion in fraudulent ad revenue per day. The operation was brought down by HUMAN Satori's threat intelligence team, but experts warn of potential future attacks.

  • The "SlopAds" campaign involved 224 malicious Android apps on Google Play that generated an astonishing 2.3 billion ad requests per day.
  • The malicious applications used various evasion tactics to avoid detection, including Firebase Remote Config and steganography.
  • The attackers impersonated game and new sites, serving ads continuously through hidden WebView screens to generate over 2 billion fraudulent ad impressions and clicks per day.
  • The campaign's infrastructure included numerous command-and-control servers and more than 300 related promotional domains.
  • The use of steganography in hiding malicious code within images was particularly noteworthy for its sophistication.



  • The world of cybersecurity has seen its fair share of high-profile attacks and scams, but a recent operation that caught the attention of security experts is none other than a massive Android ad fraud campaign dubbed "SlopAds". According to a report by HUMAN Satori, a team of threat intelligence researchers, this particular campaign involved 224 malicious Android apps on Google Play that generated an astonishing 2.3 billion ad requests per day.

    These malicious applications were used as part of an elaborate scheme designed to deceive users into installing them through the Google Play Store. Once installed, these apps would employ various evasion tactics to avoid being detected by security software and even Google's own app review process. This included using Firebase Remote Config to download encrypted configuration files that contained URLs for ad fraud malware modules, cashout servers, and JavaScript payloads.

    The malicious code was cleverly hidden within PNG images that utilized steganography to conceal pieces of the full "FatModule" malware. Upon decryption, these images would reassemble on the device to form the complete malware package. This FatModule would then use hidden WebViews to gather user and browser information before navigating to ad fraud domains controlled by attackers.

    These domains impersonated game and new sites, serving ads continuously through hidden WebView screens to generate over 2 billion fraudulent ad impressions and clicks per day, thereby creating revenue for the attackers. The campaign's infrastructure was no less impressive, with numerous command-and-control servers and more than 300 related promotional domains, suggesting that the threat actors were planning on expanding beyond the initial 224 identified apps.

    What makes this operation particularly noteworthy is its sophistication. The use of steganography in hiding malicious code within images, combined with the elaborate scheme to evade detection, demonstrates a level of cunning that is rare in malware attacks. This campaign serves as a stark reminder that cybersecurity threats can evolve and adapt quickly, making it crucial for users to remain vigilant and take proactive steps to protect themselves.

    In response to this threat, Google has since removed all identified SlopAds apps from the Play Store, updating Android's Google Play Protect to warn users about potential malware. However, experts at HUMAN caution that the complexity of this operation implies that the attackers will likely find new ways to adapt their scheme and launch future attacks.

    In conclusion, the "SlopAds" campaign highlights the need for continued vigilance in combating the ever-evolving landscape of cybersecurity threats. As technology advances, so too do the tactics employed by malicious actors, making it essential for users and developers alike to stay informed and take proactive measures to protect themselves against such threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Google-Disrupts-224-Android-Malware-Apps-Behind-23-Billion-Ad-Fraud-Campaign-Dubbed-SlopAds-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/google-nukes-224-android-malware-apps-behind-massive-ad-fraud-campaign/

  • https://www.techradar.com/pro/security/hundreds-of-android-apps-band-together-in-massive-scam-campaign-targeting-millions-heres-what-we-know


  • Published: Tue Sep 16 12:58:18 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us