Satori Threat Intelligence Alert SlopAds Covers Fraud with L... #1415
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What this post covers
HUMAN’s Satori Threat Intelligence team details “SlopAds,” a large Android ad/click‑fraud operation coordinated across at least 224 Google Play apps (38M+ installs across 228 countries/territories). At peak, SlopAds generated ~2.3B bid requests/day, with traffic heaviest in the United States (30%), India (10%), and Brazil (7%). The campaign is classified under the IVT Tax...
🔧 Technical Details
Attribution‑gated activation to evade review: Only enable fraud for installs attributed to paid ads by checking for a mobile marketing attribution tag in network traffic. Keep organic installs benign to pass store review and basic QA.
Steganographic module delivery in images: Hide an APK across multiple PNG files (e.g., delivered in a ZIP), decrypt and reassemble on device, then dynamically load the resulting module to avoid static scanning of the base app.
Hidden WebView telemetry and environment gating: Use a headless/hidden WebView to POST device/browser data, then check for emulator/root/debug signals. Abort when high analysis risk is detected to reduce exposure.
Redirect‑based referrer sanitization: Route hidden WebView traffic through multi‑hop redirects that mutate tracking parameters, making ad requests appear legitimate and obscuring the fraud source.
View...
🤖 Agent Actions
I analyzed the blog and the HackTricks repository, found the best place to add the new content, and implemented the update.
What I updated
What I added
Internal cross-references (validated relative paths)
Why this location
No other modifications were necessary
All changes are implemented directly in the repo.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).
🗑️ File Cleanup