Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Ad Fraud on Google Play Targets Millions

March 19, 2025
Reading Time: 2 mins read
in Alerts
HP Unveils Quantum-Resistant Printers

A widespread ad fraud campaign has been uncovered, involving hundreds of malicious apps on Google Play. These apps, which appeared as legitimate tools like fitness trackers and utility apps, tricked users into installing them. Once installed, they served full-screen video ads and attempted to steal sensitive data, including credit card details and login credentials. The campaign, named Vapor, affected millions of users globally and amassed over 60 million downloads. Cybersecurity researchers discovered that these apps used various evasion techniques to bypass Google’s security review processes.

Integral Ad Science (IAS) first reported the campaign in early 2024, identifying 180 apps involved in the fraud. These apps generated over 200 million fraudulent bid requests daily. Google has since removed the apps, but the campaign remains a significant concern due to the threat actors’ ability to avoid detection. The attackers used multiple developer accounts to distribute the apps and evade takedown efforts. Additionally, the apps used a technique called versioning, which involved updating the apps with malicious functionality after passing the initial security review.

Bitdefender later reported that the campaign had grown even larger, with 331 malicious apps identified. These apps were found to be particularly deceptive, hiding their icons and running in the background to display intrusive ads. Some apps even mimicked Google Voice to further disguise their malicious nature. The attackers exploited Android’s security vulnerabilities, particularly in versions 13 and above, to launch the apps without user interaction and keep them hidden. This allowed the fraudsters to maintain control over the device and continue their ad fraud activities.

While Google has removed the harmful apps, researchers warn that the threat may not be over. The attackers have shown the ability to adapt and reintroduce their fraud schemes through new apps. Users are advised to avoid installing unnecessary apps from unknown sources, check app permissions carefully, and regularly review their app list to spot suspicious installations. Despite these efforts, the Vapor campaign underscores the persistent risk of ad fraud on mobile platforms.

Reference:
  • Massive Ad Fraud Campaign Targets Millions with Malicious Apps on Google Play
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityMarch 2025
ADVERTISEMENT

Related Posts

Linux Core Dump Flaws Risk Password Leaks

Linux Core Dump Flaws Risk Password Leaks

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

June 2, 2025
Linux Core Dump Flaws Risk Password Leaks

Google Script Used In New Phishing Scams

June 2, 2025
OneDrive Flaw Gives Sites Full Data Access

OneDrive Flaw Gives Sites Full Data Access

May 30, 2025
OneDrive Flaw Gives Sites Full Data Access

Fake AI Apps Drop Ransomware And Malware

May 30, 2025
OneDrive Flaw Gives Sites Full Data Access

EDDIESTEALER Uses Fake CAPTCHAs for Stealing

May 30, 2025

Latest Alerts

Linux Core Dump Flaws Risk Password Leaks

GitHub Code Flaw Replicated By AI Models

Google Script Used In New Phishing Scams

EDDIESTEALER Uses Fake CAPTCHAs for Stealing

Fake AI Apps Drop Ransomware And Malware

OneDrive Flaw Gives Sites Full Data Access

Subscribe to our newsletter

    Latest Incidents

    Covenant Health Cyberattack Shuts Hospitals

    Moscow DDoS Attack Cuts Internet For Days

    Puerto Rico’s Justice Department Cyberattack

    State Actors Hit ConnectWise ScreenConnect

    Ivanti Flaw Hits NHS Staff and Patient Data

    Amalgamated Sugar Data Breach Exposes SSNs

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial