Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Konfety Ad Fraud (Scam) – Malware

January 30, 2025
Reading Time: 2 mins read
in Malware
Konfety Ad Fraud (Scam) – Malware

Konfety Ad Fraud

Type of Malware

Scam

Date of initial activity

2024

Motivation

Financial Gain
Data Theft

Type of Information Stolen

Personally Identifiable Information (PII)
Login Credentials

Attack Vectors

Phishing

Targeted Systems

Android

Overview

The Konfety ad fraud campaign has emerged as one of the most sophisticated and alarming threats in the digital advertising landscape. This operation, characterized by its cunning tactics and extensive reach, exploited a variety of mobile applications to manipulate advertising ecosystems on a massive scale. At its peak, the Konfety scheme generated an astonishing 10 billion fraudulent bid requests per day, drawing the attention of cybersecurity experts and advertising professionals alike. The campaign serves as a stark reminder of the vulnerabilities that can be exploited in the ever-evolving digital marketplace, highlighting the need for robust defenses against such deceptions.

Targets

Individuals Information

How they operate

At the heart of the Konfety operation lies the CaramelAds SDK, an advertising software development kit that, while not malicious by design, became a vehicle for orchestrating an elaborate fraud scheme. The threat actors behind Konfety employed an “evil twin” evasion technique, which involved creating a network of decoy applications on the Google Play Store. These decoys masqueraded as legitimate apps, deceiving users and advertisers alike while generating illicit revenue for the fraudsters. By leveraging this strategy, the Konfety actors not only managed to evade detection but also perpetuated their fraudulent activities across various advertising networks. The technical sophistication of the Konfety campaign is matched only by its sheer scale. With over 250 apps involved in the scheme, the perpetrators crafted a web of deceit that obscured their operations from conventional security measures. Their methods included malvertising, click-baiting, and drive-by attacks, all designed to manipulate traffic and hijack user interactions for profit. The impact of this campaign was felt not just by the fraudsters’ immediate targets but also by the wider advertising ecosystem, affecting legitimate developers and advertisers who unknowingly found themselves entangled in the fraud.  
References:
  • The Party’s Over: HUMAN’s Satori Threat Intelligence and Research Team Cleans up “Konfety” Mobile Ad Fraud Campaign
Tags: AndroidCaramelAds SDKClick-baitingCybersecurityDrive by attackFraudGoogle Play StoreKonfetyKonfety Ad FraudMalvertisingMalwarePlay StoreScams
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

nOAuth Flaw Allows Easy Account Takeover

Unpatchable Flaw In Hundreds Of Printers

Open VSX Flaw Allowed Extension Hijacks

Fake Job Offers Hide North Korean Malware

New Malware Uses Prompts To Trick AI Tools

New Zero Day Flaw Hits Citrix NetScaler

Subscribe to our newsletter

    Latest Incidents

    Hawaiian Airlines Hit By Cyberattack

    Qilin Ransomware Gang Hacks Estes Freight

    Generali Customer Data Exposed In Hack

    Resupply DeFi Protocol Hacked For $9.6M

    Cyberattack Hits South Tyrol Emergency Ops

    UK’s Glasgow City Council Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial