Google dismantles huge Android ad fraud network distributing malware through 224 apps

In a significant revelation, security researchers from HUMAN’s Satori Threat Intelligence and Research Team, in collaboration with Google, have successfully dismantled an extensive ad fraud scheme known as SlopAds. This operation involved over 224 AI-themed applications that were designed to generate fraudulent ad views and clicks, effectively deceiving advertisers and ad networks.

The Scale of the Operation

SlopAds was not a small-scale endeavor; it amassed over 38 million downloads across 228 countries and territories, making its reach nearly global. At its zenith, the scheme was responsible for an astonishing 2.3 billion ad bid requests each day. The majority of this fraudulent traffic originated from the United States (30%), followed by India (10%) and Brazil (7%).

The mechanism behind SlopAds was particularly insidious. The apps utilized hidden browsers that loaded websites controlled by the attackers, often featuring fake news content or HTML5 games. This setup allowed the apps to simulate ad clicks and impressions, transforming compromised smartphones into what can be described as ghost click farms.

Upon uncovering the operation, HUMAN promptly alerted Google, which took decisive action by removing all identified apps from the Google Play Store. Additionally, Google reached out to users who had downloaded these malicious applications, advising them to uninstall them immediately to mitigate any potential risks.

Despite the successful takedown, experts caution that the sophistication of the SlopAds operation suggests that the perpetrators may adapt and evolve their tactics to continue exploiting the digital advertising ecosystem. As the landscape of online advertising becomes increasingly complex, vigilance remains paramount in safeguarding against such fraudulent schemes.

AppWizard
Google dismantles huge Android ad fraud network distributing malware through 224 apps