A significant ad fraud and click fraud scheme known as SlopAds has been uncovered, involving a network of 224 applications that have collectively garnered 38 million downloads across 228 countries. The Satori Threat Intelligence and Research Team at HUMAN reported that these apps utilize steganography to embed hidden WebViews that redirect users to cashout sites controlled by the fraudsters, generating fraudulent ad impressions and clicks. At its peak, the SlopAds campaign was responsible for 2.3 billion bid requests daily, primarily from the United States (30%), India (10%), and Brazil (7%). Google has removed all implicated apps from the Play Store. The SlopAds scheme features conditional execution, where the ad fraud module, FatModule, is downloaded only if the app was installed following an ad click. The FatModule is concealed within four PNG image files and gathers device and browser information while executing ad fraud through hidden WebViews. Cashout mechanisms include HTML5 game and news websites owned by the threat actors, which monetize ad impressions and clicks. Approximately 300 domains promoting SlopAds apps have been identified, linking back to a secondary domain, ad2[.]cc, serving as a Tier-2 command-and-control server.