Friday, October 11, 2024
HomeMalwareHackers Earning Money from Invisible Ads using Android Trojan that Downloads 6.5...

Hackers Earning Money from Invisible Ads using Android Trojan that Downloads 6.5 Million Times via Google Play

Published on

Malware protection

A powerful Android Trojan distributed through Google Play store apps that posed as Fashion and game apps to generate a huge revenue using malicious invisible ads.

This Trojan distributed under several Google Play store apps which have been downloaded more than 6,500,000 times in total.

Trojan detected as Android.RemoteCode.152.origin by Russian security firm Dr.web and it mainly distributed via Game based Android apps.

- Advertisement - SIEM as a Service

Malware developer embedded their malicious software module within the application that was distributed via Google Play store.

Once the Malicious apps installed into the victim’s device, silent downloading and launching of the auxiliary plug-ins designed for downloading advertising web pages and clicking on banners located on the.

How Do Hackers Earn Money using Android Trojan

Once the In-built  Trojan application(Android.RemoteCode.152.origin) successfully launched into victims Android device, it keeps starts itself every time users reboot the device.

After the successful launch, Malicious module downloads another Trojan module from the command & control servers that managed by the attackers and launch the downloaded Trojan module.

Built-in Trojan Shows Picture in Android Mobile to Monetise

Later it downloads another module which is modified version of the advertising development SDK based on MobFox SDK advertising platform which is designed for monetizing applications.

Trojan itself perform the configuration set and it silently creates various advertisements and banners, and then clicks on them, earning money for criminals.

Also it Trojan connect the dedicated mobile marketing network AppLovin which is used to generate additional income by downloading the advertisements.

Following Program was detected as Malicious apps from Google Play Store.

  • Beauty Salon – Dress Up Game, version 5.0.8;
  • Fashion Story – Dress Up Game, version 5.0.0;
  • Princess Salon – Dress Up Sophie, version 5.0.1;
  • Horror game – Scary movie quest, version 1.9;
  • Escape from the terrible dead, version 1.9.15;
  • Home Rat simulator, version 2.0.5;
  • Street Fashion Girls – Dress Up Game, version 6.07;
  • Unicorn Coloring Book, version 134.
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windwos Servers

The attackers exploited the EternalBlue vulnerability to gain initial access to the observatory farm,...

DCRAt Attacking Users Via HTML Smuggling To Steal Login Credentials

In a new campaign that is aimed at users who speak Russian, the modular...

LummaC2 Stealer Leverages Customized Control Flow Indirection For Execution

The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its...