By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads
Computing

New Ad Fraud Campaign Exploits 331 Apps with 60M+ Downloads for Phishing and Intrusive Ads

News Room
Last updated: 2025/03/18 at 10:13 AM
News Room Published 18 March 2025
Share
SHARE

Mar 18, 2025Ravie LakshmananAd Fraud / Mobile Security

Cybersecurity researchers have warned about a large-scale ad fraud campaign that has leveraged hundreds of malicious apps published on the Google Play Store to serve full-screen ads and conduct phishing attacks.

“The apps display out-of-context ads and even try to persuade victims to give away credentials and credit card information in phishing attacks,” Bitdefender said in a report shared with The Hacker News.

Details of the activity were first disclosed by Integral Ad Science (IAS) earlier this month, documenting the discovery of over 180 apps that were engineered to deploy endless and intrusive full-screen interstitial video ads. The ad fraud scheme was codenamed Vapor.

Cybersecurity

These apps, which have since been taken down by Google, masqueraded as legitimate apps and collectively amassed more than 56 million downloads between them, generating over 200 million bid requests daily.

“Fraudsters behind the Vapor operation have created multiple developer accounts, each hosting only a handful of apps to distribute their operation and evade detection,” the IAS Threat Lab said. “This distributed setup ensures that the takedown of any single account would have minimal impact on the overall operation.”

By mimicking seemingly harmless utility, fitness, and lifestyle applications, the operation has been able to successfully dupe unwitting users into installing them.

New Ad Fraud Campaign

Another important aspect is that the threat actors have been found employing a sneaky technique called versioning, which involves publishing to the Play Store a functional app sans any malicious functionality such that it passes Google’s vetting process. The features are removed in subsequent app updates to show intrusive ads.

What’s more, the ads hijack the device’s entire screen and prevent the victim from using the device, rendering it largely inoperable. It’s assessed that the campaign began sometime around April 2024, before expanding at the start of this year. More than 140 bogus apps were uploaded to the Play Store in October and November alone.

The latest findings from the Romanian cybersecurity company show that the campaign is bigger than previously thought, featuring as many as 331 apps that racked up more than 60 million downloads in total.

Besides hiding the app’s icon from the launcher, some of the identified applications have also been observed attempting to collect credit card data and user credentials for online services. The malware is also capable of exfiltrating device information to an attacker-controlled server.

Another technique used for detection evasion is the use of Leanback Launcher, a type of launcher specifically designed for Android-based TV devices, and changing its own name and icon to impersonate Google Voice.

Cybersecurity

“Attackers figured out a way to hide the apps’ icons from the launcher, which is restricted on newer Android iterations,” Bitdefender said. “The apps can start without user interaction, even though this should not be technically possible in Android 13.”

It’s believed that the campaign is the work of either a single threat actor or several cybercriminals who are making use of the same packing tool that’s advertised for sale on underground forums.

“The investigated applications bypass Android security restrictions to start activities even if they are not running in the foreground and, without required permissions to do so, spam the users with continuous, full-screen ads,” the company added. “The same behavior is used to serve UI elements featuring phishing attempts.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article As Coffee And Chocolate Prices Surge, Startups Scale Up Alternatives
Next Article SpaceX capsule with retrieved astronauts departs space station
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Oracle adds AMD GPUs to Cloud infrastructure: will this growth help?
News
X.Org Server 21.1.17 & XWayland 24.1.7 Fix The Latest Batch Of Security Issues
Computing
TPA: Buying crypto should not be likened to gambling – UKTN
News
Bose QuietComfort Ultra 2 vs Sony WF-1000XM5: Comparing the ANC earbuds
Gadget

You Might also Like

Computing

X.Org Server 21.1.17 & XWayland 24.1.7 Fix The Latest Batch Of Security Issues

2 Min Read
Computing

China’s 2025 618 Shopping Festival: Simplified discounts and new incentives from Tmall, JD.com, Douyin, and PDD · TechNode

3 Min Read
Computing

How to Use LinkedIn for Beginners

11 Min Read
Computing

Migrating Your DApp from Infura/Alchemy to GetBlock: A Step-by-Step Guide | HackerNoon

25 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?