Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Trapdoor Android ad fraud scheme reaches 659 million bid requests per day using 455 apps

OpenAI co-founder Andrej Karpathy joins Anthropic’s pre-training team

US cyber agency CISA releases tons of passwords and cloud keys to the open web

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Trapdoor Android ad fraud scheme reaches 659 million bid requests per day using 455 apps
Identity

Trapdoor Android ad fraud scheme reaches 659 million bid requests per day using 455 apps

By May 19, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMay 19, 2026Malvertising/Mobile Security

Cybersecurity researchers have revealed details of a new ad fraud and malvertising operation called “Trapdoor” targeting Android device users.

According to HUMAN’s Satori Threat Intelligence and Research Team, this activity involved 455 malicious Android apps and 183 threat actor-owned command and control (C2) domains, turning the infrastructure into a multi-stage fraud pipeline.

“Users unknowingly download apps owned by threat actors, often utility-style apps such as PDF viewers or device cleanup tools,” researchers Luisa Abel, Ryan Joy, João Marquez, João Santos, and Adam Sell detailed in a report shared with Hacker News.

“These apps launch malvertising campaigns that force users to download apps owned by additional threat actors. The secondary apps launch hidden WebViews, load HTML5 domains owned by threat actors, and request advertisements.”

The cybersecurity firm added that the campaign is self-sustaining in that organic app installs can be turned into illegal revenue generation cycles that can be used to fund subsequent malvertising campaigns. One notable aspect of this activity is the use of HTML5-based cashout sites. This is a pattern observed in previous threat clusters tracked as SlopAds, Low5, and BADBOX 2.0.

At the peak of the operation, the trapdoor recorded 659 million bid requests per day, and Android apps linked to the scheme were downloaded more than 24 million times. Traffic associated with this campaign primarily came from the United States, which accounted for more than three-quarters of the traffic volume.

“The attackers behind Trapdoor also exploit install attribution tools (technology designed to allow legitimate marketers to track how users discover their apps) to enable malicious behavior only on users acquired through advertising campaigns run by the threat actor, and suppress it for organic downloads of associated apps,” HUMAN said.

Trapdoor combines two different approaches: malvertising distribution and monetization through covert ad fraud. In this case, unsuspecting users end up downloading a fake app disguised as a seemingly harmless utility. This utility acts as a conduit for serving malicious ads to other Trapdoor apps. In addition to performing auto-touch fraud, these apps are designed to launch hidden WebViews, load washout domains controlled by threat actors, and request advertisements.

Please note that only second stage apps are used to commit fraud. When a naturally downloaded app is launched, it displays a fake pop-up alert that mimics an app update message to trick the user into installing the next stage of the app.

This behavior also indicates that the payload will only be activated for victims of the advertising campaign. This means that people who directly download or sideload apps from the Play Store are not targeted. In addition to this selective activation technique, Trapdoor uses various anti-analysis and obfuscation techniques to evade detection.

“This operation uses real, everyday software and multiple obfuscation and anti-analysis techniques (including blending disguised legitimate SDKs) to blend malvertising delivery, covert ad fraud monetization, and multi-stage malware delivery,” said Lindsay Kaye, VP of Threat Intelligence at HUMAN.

Following responsible disclosure, Google has taken steps to remove all identified malicious apps from the Google Play Store, effectively neutralizing their operations. A complete list of Android apps is available here.

“Trapdoor shows how determined fraudsters are turning everyday app installs into self-funding pipelines for malvertising and ad fraud,” said Gavin Reid, chief information security officer at Human. “This is another example of attackers leveraging legitimate tools, such as attribution software, to aid their fraud and evade detection.”

“Through a chain of utility apps, HTML5 cache-out domains, and selective activation techniques that hide them from researchers, these threat actors are constantly evolving, and our Satori team is working to track them down and disrupt them at scale.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOpenAI co-founder Andrej Karpathy joins Anthropic’s pre-training team

Related Posts

DirtyDecrypt PoC released for Linux kernel CVE-2026-31635 LPE vulnerability

May 19, 2026

How OAuth consent bypasses MFA

May 19, 2026

Drupal releases emergency core security update on May 20th, sites are told to prepare

May 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Trapdoor Android ad fraud scheme reaches 659 million bid requests per day using 455 apps

OpenAI co-founder Andrej Karpathy joins Anthropic’s pre-training team

US cyber agency CISA releases tons of passwords and cloud keys to the open web

DirtyDecrypt PoC released for Linux kernel CVE-2026-31635 LPE vulnerability

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.