Facebook Twitter Instagram
    • Privacy Policy
    • Contact Us
    Facebook Twitter Instagram Pinterest Vimeo
    AI Home SecurityAI Home Security
    • Home
    • Home Security
    • Cyber Security
    • Biometric Technology
    Contact
    AI Home SecurityAI Home Security
    Cyber Security

    Massive Ad Fraud Scheme Targeted Over 11 Million Devices with 1,700 Spoofed Apps

    justmattgBy justmattgJanuary 23, 2023No Comments3 Mins Read

    [ad_1]

    Jan 23, 2023Ravie LakshmananMobile Security / Malvertising

    Massive Ad Fraud Scheme

    Researchers have shut down an “expansive” ad fraud scheme that spoofed more than 1,700 applications from 120 publishers and impacted roughly 11 million devices.

    “VASTFLUX was a malvertising attack that injected malicious JavaScript code into digital ad creatives, allowing the fraudsters to stack numerous invisible video ad players behind one another and register ad views,” fraud prevention firm HUMAN said.

    The operation gets its name from the use of a DNS evasion technique called Fast Flux and VAST, a Digital Video Ad Serving Template that’s employed to serve ads to video players.

    The sophisticated operation particularly exploited the restricted in-app environments that run ads on iOS to place bids for displaying ad banners. Should the auction be won, the hijacked ad slot is leveraged to inject rogue JavaScript that establishes contact with a remote server to retrieve the list of apps to be targeted.

    The includes the bundle IDs that belong to legitimate apps so as to conduct what’s called as an app spoofing attack, in which a fraudulent app passes off as a highly-regarded app in an attempt to trick advertisers into bidding for the ad space.

    Ad Fraud Scheme

    The ultimate objective, per HUMAN, was to register views for as many as 25 video ads by layering them atop one another in a manner that’s completely invisible to the users and generates illicit revenue.

    “It doesn’t stop with the stacked ads, though,” the company said. “For as many of those as might be rendering on a user’s device at once, they keep loading new ads until the ad slot with the malicious ad code is closed.”

    Ad Fraud Scheme

    “The actors behind the VASTFLUX scheme clearly have an intimate understanding of the digital advertising ecosystem,” it further added, stating the campaign also rendered an endless “playlist” of ads to defraud both the advertising companies and apps that show ads.

    The takedown of VASTFLUX arrives three months after the disruption of Scylla, a fraud operation targeting advertising software development kits (SDKs) within 80 Android apps and 9 iOS apps published on the official storefronts.

    VASTFLUX, which generated over 12 billion bid requests per day at its peak, is only the latest in a stretch of ad fraud botnets that have been shuttered in recent years, after 3ve, PARETO, and Methbot.

    Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



    [ad_2]

    Source link

    Previous ArticleNew Backdoor Created Using Leaked CIA’s Hive Malware Discovered in the Wild
    Next Article Samsung Galaxy Store App Found Vulnerable to Sneaky App Installs and Fraud
    justmattg
    • Website

    Related Posts

    Cyber Security

    Name That Toon: Last Line of Defense

    April 16, 2024
    Cyber Security

    OpenJS Foundation Targeted in Potential JavaScript Project Takeover Attempt

    April 16, 2024
    Cyber Security

    Middle East Cyber Ops Intensify, With Israel the Main Target

    April 16, 2024
    Add A Comment

    Leave A Reply Cancel Reply

    Facebook Twitter Instagram Pinterest
    • Privacy Policy
    • Contact Us
    AI Home Security © 2025 All rights reserved | Designed By ESmartsSolution

    Type above and press Enter to search. Press Esc to cancel.

    ↑