Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Google Removes 224 Android Malware Apps

September 18, 2025
Reading Time: 2 mins read
in Alerts
Apple Backports Fix For Exploited Bug

A widespread ad fraud operation, nicknamed “SlopAds,” has been stopped. The campaign was discovered by HUMAN’s Satori Threat Intelligence team and involved 224 malicious applications on the Google Play Store that were downloaded more than 38 million times. These apps used sophisticated methods like obfuscation and steganography to evade detection by Google’s security tools. The operation was globally massive, with ad traffic reaching 2.3 billion bid requests every single day. The highest volume of ad impressions came from the United States, which accounted for 30% of the traffic, followed by India and Brazil.

The researchers who uncovered the operation named it “SlopAds” because the apps appeared to be mass-produced, similar to what is known as “AI slop,” which also referenced a variety of AI-themed apps and services found on the threat actors’ command-and-control server. The SlopAds ad fraud campaign used various evasion tactics to get around Google’s app review process and other security software.

These malicious apps were designed to behave differently depending on how a user installed them. If a user installed an app naturally from the Play Store without clicking on one of the campaign’s ads, it would function normally. However, if the app detected that it was installed through one of the threat actors’ ad campaigns, it would use Firebase Remote Config to download an encrypted configuration file. This file contained URLs for the ad fraud malware module, cashout servers, and a JavaScript payload.

Once the app had this file, it would then perform a series of checks to ensure it was running on a real user’s device and not being analyzed by a security researcher or software. This was a crucial step in their plan to avoid detection.

If the app passed these checks, it would download four separate PNG images. These images were not what they seemed; they used steganography to conceal parts of a malicious APK, or Android application package, that was the core of the ad fraud campaign.

Reference:

  • Google Nukes 224 Android Malware Apps Involved In Massive Ad Fraud Campaign
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

CISA Highlights Ongoing Spyware Campaign

Formatters Leak Thousands Of Secrets

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

Second Wave Hits Thousands Of Repos

November 25, 2025
CISA Highlights Ongoing Spyware Campaign

CISA Highlights Ongoing Spyware Campaign

November 25, 2025
ShadowPad Exploits WSUS Flaw For Access

Windows 11 24H2 Explorer And Start Crash

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

Matrix Push C2 Uses Browser Alerts To Phish

November 24, 2025
ShadowPad Exploits WSUS Flaw For Access

ShadowPad Exploits WSUS Flaw For Access

November 24, 2025

Latest Alerts

Formatters Leak Thousands Of Secrets

Second Wave Hits Thousands Of Repos

CISA Highlights Ongoing Spyware Campaign

Windows 11 24H2 Explorer And Start Crash

Matrix Push C2 Uses Browser Alerts To Phish

ShadowPad Exploits WSUS Flaw For Access

Subscribe to our newsletter

    Latest Incidents

    Canon Subsidiary Hit By Oracle Hack

    Harvard Reports Significant Data Breach

    Dartmouth Confirms Major Data Breach

    Delta Dental Virginia Breach Hits 146000

    Iberia Alerts Customers To Data Breach

    Cox Confirms Oracle Hack As Victims Named

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial