Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers reveal Ecscape’s flaws in Amazon ECS that allow cross-task qualification theft

Upwork is buying its way to staffing companies beyond freelancers

Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams
Identity

Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams

userBy userAugust 6, 2025No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A malicious ad technician known as Vextrio Viper has developed several malicious apps published on Apple and Google’s official App Storefronts, and is being developed under the guise of seemingly useful applications.

These apps pretend to be VPNs, device apps, RAM cleaners, dating services, and spam blockers. DNSThreatIntelligence Firm Infoblox says in a thorough analysis shared with hacker news.

“They released apps under several developer names, including Holacode, Mocomind, Hugmi, Klover Group, and Alphascale Media,” the company said. “It’s available on Google Play and the Apple Store, and these have been downloaded in a total of millions of times.”

Once installed, these fake apps will sign up for subscriptions that users find difficult to cancel, flooded with ads, separate personal information such as email addresses. It is worth noting that Mocomind was previously flagged by Cyjax as part of a phishing campaign that offers ads that falsely claim that the device is corrupted.

Cybersecurity

One such Android app is Spam Shield Block. It claims to be a spam blocker for push notifications, but in reality, it charges users a few times after persuading them to sign up for a subscription.

“We’ll ask for money right away, or the ads are very destructive and we uninstalled them before even trying them out,” one user said in a review of the app on the Google Play Store.

Another review is: “This app should be $14.99 a month. In February, it was billed weekly at $14.99, which would be $70 per month/$720 per year/$720 per year. There’s no problem trying to uninstall it. Phone.”

How threat actors can make money using compromised sites and SmartLinks

The new findings bare the size of multinational criminal enterprises including numerous traffic distribution services (TDSES), including numerous traffic distribution services (TDSES), including extensive traffic distribution services (TDSES), since 2015, fraudulently through ad networks since 2015, and manage the management of payment processors such as email verification tools such as Pay Salsa and DataSNAP.

“Vextrio and its partners have been successful in part because their business is obfuscated,” the company said. “But the majority of their success is because they know that they are stuck in fraud and therefore have less risk of consequences.”

Vextrio is known to run what is called commercial affiliate networks and acts as an intermediary between, for example, malware distributors who have compromised a collection of WordPress websites with malicious injections and malware distributors who have compromised a collection of threat acters who have promoted various fraudulent schemes.

TDS is rated as being created by a shell company called Adspro Group, and the key figures behind the organizations in Italy, Belarus and Russia have expanded operations in Bulgaria, Moldova, Romania, Estonia and the Czech Republic since at least 2004, and has been linked to more than 100 companies and brands in 2015.

“Russian organized crime groups began to start building empires in advertising technology around 2015,” Dr Renée Burton, VP of Infoblox Threat Intel told Hacker News. “Vextrio is an important group within this industry, but there are other groups. From dating scams to investment scams and information stealers, all sorts of cybercrimes use malicious Adtech and are barely noticed.”

But what’s noteworthy about threat actors is the control of both the publisher and advertising of affiliate networks through a vast network of intertwined companies such as Technology, Los Pollos, Taco Loco, and Adtrafico. In May 2024, Los Pollos said it had 200,000 affiliates and over 2 billion unique users each month.

More widely fraud is unfolded this way. Users who are legal but unsuspecting to land on infected sites will be routed through TD under Vextrio’s control, leading users to fraudulent landing pages. This is achieved by SmartLink, which runs through the final landing page and hinders analysis.

Identity Security Risk Assessment

Both Los Pollos and Adtrafico are cost-per-action (CPA) networks that allow public affiliates to earn fees when site visitors perform their intended actions. This may allow you to accept notices on the website, provide personal information, download apps, or provide credit card information.

They are also known to be the leading spam distributor reaching out to millions of potential victims.[.]Breaks and Mailgun (” Mailgun[.](Enjoyed) to promote service.

Another important aspect is to use cloaking services like Imkuro to hide real domains, evaluate criteria such as user location, device type, browser, etc., and determine the exact nature of content being delivered.

“The security industry, and most of the world, are now more focused on malware,” Burton said. “In a way, this is a victim’s criticism, and I believe that those who fall into fraud somehow deserve more of a fraud.”

“So stealing credit card information through malware is somehow “bad” than being invited to give up, even if you want a stupid stroke of keys like the current fake Captcha/Clickfix attack. Cybersecurity education and greater awareness to treat fraud of the same severity as malware is a malicious way of doing things.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleRivalry apps for men leak user personal data and driver’s license
Next Article Upwork is buying its way to staffing companies beyond freelancers
user
  • Website

Related Posts

Researchers reveal Ecscape’s flaws in Amazon ECS that allow cross-task qualification theft

August 6, 2025

AI slashes VCISO workloads by 68% as SMBS demands more – new report reveals

August 6, 2025

Microsoft launches Project IRE to autonomously classify malware using AI tools

August 6, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers reveal Ecscape’s flaws in Amazon ECS that allow cross-task qualification theft

Upwork is buying its way to staffing companies beyond freelancers

Fake VPN and spam blocker apps associated with vextrio used in ad fraud, subscription scams

Rivalry apps for men leak user personal data and driver’s license

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Google’s Genie 3: The Dawn of General AI?

FySelf, PODs, TwinH: Revolutionizing Digital Identity & Government Data Control

Beyond Zuckerberg’s Metaverse: TwinH Powers Digital Government with Berners-Lee’s New Internet Vision

The TwinH Advantage: Unlocking New Potential in Digital Government Strategies

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.