advertising ecosystem

AppWizard
March 6, 2025
HUMAN Security’s Satori Threat Intelligence team has identified a malware operation called “BADBOX 2.0,” which has compromised over 50,000 Android devices through 24 deceptive applications. This operation is an escalation from the original BADBOX campaign detected in 2023. The malware primarily targets low-cost, off-brand Android Open Source Project devices, including TV boxes, tablets, digital projectors, and vehicle infotainment systems. A backdoor named “BB2DOOR” provides threat actors with persistent access to the compromised systems. Four groups of threat actors—SalesTracker Group, MoYu Group, Lemon Group, and LongTV—are involved, using shared infrastructure for various fraud schemes. The malicious applications mimic legitimate apps in the Google Play Store, generating up to 5 billion fraudulent ad requests weekly. In response, Google has enhanced its protections, including blocking BADBOX behavior during app installation and terminating associated publisher accounts. Infected devices were found to be uncertified Android Open Source Project devices from China. Users are advised to verify certification and avoid unofficial app sources.
AppWizard
March 5, 2025
Google has removed over 180 applications from its Play Store due to a scheme exploiting Android apps for ad fraud, as revealed by Integral Ad Science (IAS). The investigation, initiated in late 2024, identified unusual app behavior and traffic patterns. The operation, named Vapor Threat, involved fraudsters creating shell applications that appeared as legitimate health and fitness tools but were designed solely to generate ad revenue through full-screen video advertisements. IAS emphasized the need for vigilance in the advertising ecosystem and highlighted the ongoing challenges of ad fraud, urging advertisers to adopt robust anti-fraud strategies.
Search