Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » ‘Konfety’ ad scam uses over 250 Google Play decoys to hide malicious twins
Global Security

‘Konfety’ ad scam uses over 250 Google Play decoys to hide malicious twins

AdminBy AdminJuly 16, 2024No Comments4 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


July 16, 2024Information hallMobile Security / Internet Security

Details have emerged of a “massive ad fraud operation” using hundreds of apps on the Google Play Store to carry out a host of nefarious activities.

The company received a code name Confetti – the Russian word for Candy – due to abuse of a mobile advertising software kit (SDK) linked to a Russian ad network called CaramelAds.

“Konfety represents a new form of fraud and obfuscation in which threat actors operate ‘evil twin’ versions of decoy programs available in major markets,” Satori Threat Intelligence Team HUMAN said in a technical the report shared with The Hacker News.

While the more than 250 rogue apps are harmless and distributed through the Google Play Store, their respective “evil twins” are distributed through a malicious ad campaign designed to promote ad fraud, monitor web searches, install browser extensions and sideloading APK files encode on users’ devices.

The most unusual aspect of the campaign is that the evil twin masquerades as a decoy twin by spoofing the latter’s app ID and ad publisher IDs to render ads. Both rogue and malicious application twin sets run on the same infrastructure, allowing threat actors to exponentially scale their operations as needed.

Cyber ​​security

However, the cheat apps not only behave normally, most of them don’t even display ads. They also include a GDPR consent notice.

“This decoy/evil double obfuscation mechanism is a novel way for threat actors to present fraudulent traffic as legitimate,” the HUMAN researchers said. “At its peak, the programmatic volume associated with Konfety reached 10 billion requests per day.”

In other words, Konfety uses the ad rendering capabilities of the SDK to commit ad fraud, making it much harder to distinguish between malicious and legitimate traffic.

The evil Konfety twin apps are said to be distributed through a malicious ad campaign that promotes APK mods and other software such as Letasoft Sound Booster with mined URLs hosted on attacker-controlled domains, hacked WordPress sites, and other platforms. that allow you to upload content, including Docker Hub, Facebook, Google Sites, and OpenSea.

Users who end up clicking on these URLs are redirected to a domain that tricks them into downloading a malicious twin app, which in turn acts as a dropper for the first stage, which is decrypted from the APK file’s assets and used to configure command-administrative (C2) communication.

The initial stage further attempts to hide the app icon from the device’s home screen and launches a second-stage DEX payload that performs the trick by showing an out-of-context full-screen video ad while the user is on the home screen or using another app.

“The core of Operation Konfety is evil twin programs,” the researchers said. “These apps impersonate their respective decoy twin apps by copying their app IDs/package names and publisher IDs from the decoy twin apps.”

“Network traffic originating from Evil twin applications is functionally identical to network traffic originating from decoy twin applications; ad impressions served by evil twins use the name of the twin decoy package in the request.”

Other capabilities of the malware include weaponizing the CaramelAds SDK to visit websites using the default web browser, tricking users by sending them notifications that prompt them to click on fake links, or sideloading modified versions of other ad SDKs.

That’s not all. Users who install Evil Twins apps are encouraged to add a search toolbar widget to their device’s home screen that secretly monitors their searches by sending data to domains named vptrackme(.)com and youaresearching(.)com.

“Threat actors understand that placing malware in stores is not a stable technique and are finding creative and clever ways to avoid detection and commit long-term fraud,” the researchers concluded. “Actors creating SDK middlemen and distributing SDKs to abuse high-end publishers are a growing technique.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025

Why are more security leaders choose AEV

June 6, 2025

New data Wiper Pathwiper Data Wiper violates Ukrainian critical infrastructure in 2025 attack

June 6, 2025

Popular Chrome Extensions API leaks, user data via HTTP and Hard Codes

June 5, 2025

Researchers in detail in detail decisively developing tactics as it expands its geographical volume

June 5, 2025

Iran related

June 5, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

New company Atomic MacOS Campation Exploaits Clickfix to focus on Apple users

June 6, 2025

Microsoft helps CBI disassemble the Indian Centers for Japanese Technical Support

June 6, 2025

Expand users’ capabilities and protect against Genai data loss

June 6, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.