Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The new falsification company of advertising ads exploits 331 applications with 60m+ boot for phishing and intrusive ads
Global Security

The new falsification company of advertising ads exploits 331 applications with 60m+ boot for phishing and intrusive ads

AdminBy AdminMarch 18, 2025No Comments3 Mins Read
New Ad Fraud Campaign
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 18, 2025Red LakshmananFraud with Advertising / Mobile Security

New Advertising Company

Cybersecurity researchers have warned of a large-scale ad falsification campaign that used hundreds of malicious applications published in Google Play store to serve full-screen advertising and conduct phishing over.

“In the app – Note In a report that shared with Hacker News.

The details of the activity were For the first time disclosed At the beginning of this month (IAS) (IAS), documented the opening of more than 180 applications that were designed to deploy endless and intrusive full-screen interstitial video advertising. The Advertising Fraud Scheme was a couple.

Cybersecurity

These applications, which have been removed by Google since then, have been masked as legitimate applications and collectively scored more than 56 million downloads between them, which creates more than 200 million requests.

“The fraudsters for the couple have created several developers’ accounts, each conducted only a few applications to distribute their work and detect evasion,” the SME threatening laboratory said. “This distributed installation guarantees that the removal of any single account will have a minimum effect on overall work.”

By imitating the seemingly harmless utilities, fitness and lifestyle application, the operation was able to successfully sign users before installing them.

New Advertising Company

Another important aspect is versionIncluding publication in the Play Store functional application, provides any malicious functionality so that it undergoes the Google check process. Features are removed in the following applications updates to show intrusive ads.

What’s more, the advertisement abducts the entire device screen and prevents the victim to use the device that does not work largely. It is estimated that the company began approximately in April 2024 before expanding earlier this year. More than 140 fictitious applications were loaded in October and November.

The latest results of the Romanian cybersecurity company show that the company is larger than previously, which presents 331 apps that have gained more than 60 million downloads.

In addition, to hide the application icon from the launcher, some of the identified applications were also observed by an attempt to collect credit card data and users’ accounting data. Malicious software is also capable of highlighting the device on a controlled server attacker.

Another technique used to evade detection is use Leanback LauncherType of launches specifically designed for Android television devices, as well as changing your own name and icon to present itself Google Voice.

Cybersecurity

“The attackers have found out a way to hide the insults from the launcher, which is limited to newer android iterations,” Bitdefender said. “Applications can start without users’ interaction, although it should not be technically possible in Android 13.”

It is believed that the company is a job either a single threatening actor or several cybercriminals who use the same packaging tool that is advertised for sale in underground forums.

“The investigated applications bypass Android restrictions to start activity, even if they do not work in the foreground, and without the necessary permits, spam users with continuous, full-screen advertising,” the company added. “The same behaviors are used to maintain the elements of the user interface, which provide phishing attempts.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.