Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Google Removes 224 Android Malware Apps

September 18, 2025
Reading Time: 2 mins read
in Alerts
Apple Backports Fix For Exploited Bug

A widespread ad fraud operation, nicknamed “SlopAds,” has been stopped. The campaign was discovered by HUMAN’s Satori Threat Intelligence team and involved 224 malicious applications on the Google Play Store that were downloaded more than 38 million times. These apps used sophisticated methods like obfuscation and steganography to evade detection by Google’s security tools. The operation was globally massive, with ad traffic reaching 2.3 billion bid requests every single day. The highest volume of ad impressions came from the United States, which accounted for 30% of the traffic, followed by India and Brazil.

The researchers who uncovered the operation named it “SlopAds” because the apps appeared to be mass-produced, similar to what is known as “AI slop,” which also referenced a variety of AI-themed apps and services found on the threat actors’ command-and-control server. The SlopAds ad fraud campaign used various evasion tactics to get around Google’s app review process and other security software.

These malicious apps were designed to behave differently depending on how a user installed them. If a user installed an app naturally from the Play Store without clicking on one of the campaign’s ads, it would function normally. However, if the app detected that it was installed through one of the threat actors’ ad campaigns, it would use Firebase Remote Config to download an encrypted configuration file. This file contained URLs for the ad fraud malware module, cashout servers, and a JavaScript payload.

Once the app had this file, it would then perform a series of checks to ensure it was running on a real user’s device and not being analyzed by a security researcher or software. This was a crucial step in their plan to avoid detection.

If the app passed these checks, it would download four separate PNG images. These images were not what they seemed; they used steganography to conceal parts of a malicious APK, or Android application package, that was the core of the ad fraud campaign.

Reference:

  • Google Nukes 224 Android Malware Apps Involved In Massive Ad Fraud Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Apple Backports Fix For Exploited Bug

Apple Backports Fix For Exploited Bug

September 18, 2025
Apple Backports Fix For Exploited Bug

FileFix Uses Steganography To Drop StealC

September 18, 2025
DHS Data Hub Leaked Sensitive Intel

ChatGPT Calendar Flaw Lets Email Theft

September 17, 2025
DHS Data Hub Leaked Sensitive Intel

Windows Update Breaks SMBv1 Shares

September 17, 2025
DHS Data Hub Leaked Sensitive Intel

Scattered Spider Returns Despite Exit

September 17, 2025
LangChainGo Bug Exposes Sensitive Files

VoidProxy Targets Microsoft And Google

September 16, 2025

Latest Alerts

FileFix Uses Steganography To Drop StealC

Apple Backports Fix For Exploited Bug

Google Removes 224 Android Malware Apps

ChatGPT Calendar Flaw Lets Email Theft

Windows Update Breaks SMBv1 Shares

Scattered Spider Returns Despite Exit

Subscribe to our newsletter

    Latest Incidents

    AI Forged Military IDs Used In Phishing

    Insight Partners Warns After Data Breach

    ShinyHunters Claims Salesforce Data Theft

    DHS Data Hub Leaked Sensitive Intel

    Worm Infects 180 npm Packages

    Jaguar Land Rover Delays Restart After Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial