obfuscation

Winsage
September 23, 2025
Microsoft has lifted a compatibility hold that previously prevented devices with integrated cameras from upgrading to Windows 11 24H2 due to a face detection bug causing app freezes. The hold, identified by safeguard ID: 53340062, was implemented to protect users from these issues. With the bug resolved, eligible devices can now upgrade through the Windows Update release channel, although it may take up to 48 hours for the update to be available. Microsoft also removed another safeguard hold affecting Bluetooth devices. Some compatibility blocks remain for devices using specific software and drivers. Windows 11 24H2 was officially launched in October 2024 for devices running Windows 11 22H2/23H2.
AppWizard
September 17, 2025
A mobile ad fraud operation called "SlopAds" infiltrated the Google Play Store with 224 malicious applications, which collectively achieved over 38 million downloads across 228 countries. The operation utilized advanced steganography and obfuscation techniques to deliver fraudulent advertising payloads while avoiding detection. SlopAds activated its fraud system selectively based on specific advertising campaigns, generating around 2.3 billion fraudulent bid requests daily, primarily from the United States (30%), India (10%), and Brazil (7%). The malicious apps exploited Firebase Remote Config to retrieve encrypted data for downloading a primary fraud module named "FatModule." This module was concealed within PNG image files, allowing it to bypass traditional security measures. The FatModule included anti-analysis features to evade detection by security researchers. Google has since removed all identified SlopAds applications from the Play Store and implemented protections through Google Play Protect.
AppWizard
September 17, 2025
Researchers from HUMAN’s Satori Threat Intelligence and Research Team discovered a digital advertising fraud operation called “SlopAds,” which involves 224 Android applications that have over 38 million downloads across 228 countries. SlopAds employs a multi-layered obfuscation strategy to deploy fraud modules that siphon ad revenue. The applications connect to Firebase Remote Config to retrieve an encrypted configuration that conceals URLs for PNG images containing fragments of an APK, which are reassembled to create the core fraud component known as FatModule. SlopAds generates approximately 2.3 billion bid requests daily, primarily targeting users in the United States (30%), India (10%), and Brazil (7%). Google Play Protect alerts users and blocks known SlopAds applications, and Google has removed these applications from the Play Store. Users who installed these apps from off-market sources remain vulnerable until they uninstall them.
AppWizard
September 17, 2025
224 malicious applications have been removed from the Google Play Store due to a significant ad fraud operation named "SlopAds," which amassed over 38 million downloads. The campaign spanned 228 countries, with the highest ad impressions from the United States (30%), India (10%), and Brazil (7%). The apps used sophisticated obfuscation techniques to evade Google’s security measures. Users are advised to uninstall these harmful applications, as they can negatively impact device performance by causing excessive data consumption and battery strain. Users who sideload apps from unofficial sources are particularly vulnerable to such threats. Security experts anticipate that similar ad fraud operations may occur in the future.
AppWizard
September 16, 2025
A large-scale Android ad fraud operation called "SlopAds" has been dismantled, involving 224 malicious applications on Google Play that generated 2.3 billion ad requests daily. The Satori Threat Intelligence team at HUMAN discovered that these apps were downloaded over 38 million times and reached users in 228 countries, with the U.S. accounting for 30% of ad impressions. The perpetrators used techniques like obfuscation and steganography to evade detection. If installed through ad campaigns, the apps would download a malicious module called "FatModule," which executed the ad fraud scheme by serving ads through hidden WebViews. The operation resulted in over 2 billion fraudulent ad impressions daily. Google has removed all known SlopAds applications from the Play Store and updated Google Play Protect to alert users to uninstall remaining instances.
Winsage
September 15, 2025
Microsoft has lifted the safeguard hold that restricted certain users from upgrading to Windows 11 24H2 due to compatibility issues with Bluetooth headsets and speakers. The bug, acknowledged in December, primarily affected systems using Dirac audio improvement software, causing audio-related malfunctions. The incompatibility was linked to the software component cridspapo.dll. On September 11, 2025, Microsoft announced the removal of the update block for devices with Dirac audio software, allowing them to upgrade to Windows 11, version 24H2. A new driver addressing the issue is available via Windows Update. However, upgrades remain blocked for devices with incompatible Intel Smart Sound Technology audio drivers, SenseShield Technology code-obfuscation drivers, wallpaper customization software, and integrated cameras.
Winsage
September 12, 2025
Microsoft will stop providing updates for the Home and Pro editions of Windows 11 23H2 on November 11, 2025. In contrast, the Enterprise and Education editions will continue to receive updates until November 10, 2026. Users are encouraged to upgrade to Windows 11 24H2, which became available in October 2024. Microsoft has implemented safeguard holds for the upgrade to address compatibility issues with certain drivers and software. As of July 2025, 59.9% of gamers are using Windows 11, and it has surpassed Windows 10 in market share, with over 53% of Windows systems running Windows 11. The last supported Windows 11 22H2 editions will reach their end of servicing on October 14.
Tech Optimizer
September 12, 2025
A newly identified strain of malware called ModStealer can bypass antivirus protections to steal data from cryptocurrency wallets on Windows, Linux, and macOS. It operated undetected for nearly a month, infiltrating systems through misleading job advertisements targeting software developers. ModStealer has multi-platform support and a stealthy execution chain, allowing it to launch simultaneous attacks across various operating systems. Upon execution, it scans for browser-based cryptocurrency wallet extensions, system credentials, and digital certificates. On macOS, it disguises itself as a background helper program to ensure continuous operation. Indicators of potential ModStealer infections include a hidden file named “.sysupdater.dat,” outbound connections to suspicious servers, unexpected background processes, unusual behavior from wallet extensions, and unauthorized access attempts to digital certificates. The malware poses significant risks to individual users by compromising private keys and seed phrases, and it could lead to large-scale thefts in the cryptocurrency industry. To protect against ModStealer, users are advised to use hardware wallets, enable multi-factor authentication, update antivirus software, avoid suspicious job ads, monitor startup processes, back up seed phrases offline, and use separate devices for transactions.
Search