A large advert fraud and click on fraud operation dubbed SlopAds ran a cluster of 224 apps, collectively attracting 38 million downloads throughout 228 international locations and territories.
“These apps ship their fraud payload utilizing steganography and create hidden WebViews to navigate to risk actor-owned cashout websites, producing fraudulent advert impressions and clicks,” HUMAN’s Satori Menace Intelligence and Analysis Staff stated in a report shared with The Hacker Information.
The identify “SlopAds” is a nod to the seemingly mass-produced nature of the apps and the usage of synthetic intelligence (AI)-themed providers like StableDiffusion, AIGuide, and ChatGLM hosted by the risk actor on the command-and-control (C2) server.
The corporate stated the marketing campaign accounted for two.3 billion bid requests a day at its peak, with site visitors from SlopAds apps primarily originating from the U.S. (30%), India (10%), and Brazil (7%). Google has since eliminated all of the offending apps from the Play Retailer, successfully disrupting the risk.
What makes the exercise stand out is that when a SlopAds-associated app is downloaded, it queries a cell advertising attribution SDK to verify if it was downloaded instantly from the Play Retailer (i.e., organically) or if it was the results of a person clicking on an advert that redirected them to the Play Retailer itemizing (i.e., non-organically).
The fraudulent habits is initiated solely in situations the place the app was downloaded following an advert click on, inflicting it to obtain the advert fraud module, FatModule, from the C2 server. However, if it was initially put in, the app behaves as marketed on the app retailer web page.
“From growing and publishing apps that solely commit fraud underneath sure circumstances to including layer upon layer of obfuscation, SlopAds reinforces the notion that threats to the digital promoting ecosystem are solely rising in sophistication,” HUMAN researchers stated.
“This tactic creates a extra full suggestions loop for the risk actors, triggering fraud provided that they’ve motive to consider the system is not being examined by safety researchers. It blends malicious site visitors into legit marketing campaign information, complicating detection.”
The FatModule is delivered by way of 4 PNG picture information that conceal the APK, which is then decrypted and reassembled to assemble system and browser info, in addition to conduct advert fraud utilizing hidden WebViews.
“One cashout mechanism for SlopAds is thru HTML5 (H5) recreation and information web sites owned by the risk actors,” HUMAN researchers stated. “These recreation websites present adverts incessantly, and for the reason that WebView through which the websites are loaded is hidden, the websites can monetize quite a few advert impressions and clicks earlier than the WebView closes.”
Domains selling SlopAds apps have been discovered to hyperlink again to a different area, ad2[.]cc, which serves because the Tier-2 C2 server. In all, an estimated 300 domains promoting such apps have been recognized.
The event comes a little bit over two months after HUMAN flagged one other set of 352 Android apps as a part of an advert fraud scheme codenamed IconAds.
“SlopAds highlights the evolving sophistication of cell advert fraud, together with stealthy, conditional fraud execution and fast scaling capabilities,” Gavin Reid, CISO at HUMAN, stated.




