SlopAds Hits 38 Million Downloads With Malicious Android Apps

17 Sep 2025

A sophisticated mobile ad fraud operation, known as SlopAds, recently penetrated the Google Play Store with 224 malicious applications, collectively garnering over 38 million downloads across 228 countries and territories. The operation employed advanced techniques such as steganography and multi-layered obfuscation to deliver fraudulent advertising payloads while skillfully evading detection.

Conditional Fraud Activation

The SlopAds campaign utilized a conditional fraud system, activating its malicious payloads only when users installed apps through specific advertising channels rather than organic visits to the Play Store. This tactic allowed the apps to maintain a guise of legitimacy, staying on the platform longer despite their fraudulent nature. According to Human Security analysts, the operation orchestrated approximately 2.3 billion fraudulent bid requests daily at its peak, with significant traffic from the United States, India, and Brazil.

Exploiting Development Services

The fraudulent apps took advantage of legitimate development services, notably Firebase Remote Config, to retrieve encrypted configuration data. This data contained URLs pointing to the download of the primary fraud module, termed 'FatModule'. The delivery of these payloads relied on digital steganography, where command-and-control servers dispatched specially crafted PNG files embedded within encrypted ZIP archives. Upon decryption and reassembly, these images revealed APK components forming the complete FatModule.

Advanced Anti-Analysis Techniques

FatModule was designed with multiple anti-analysis measures to thwart detection and examination. These techniques included recognition of debugging and hooking frameworks (searching for terms like 'hook', 'Xposed', and 'Frida'), string encryption, and packed native code, all aimed at inhibiting both static and dynamic analysis. Fraud execution occurred within concealed WebViews, which meticulously collected device fingerprinting data, such as hardware specifications and GPU details, to enable accurate targeting of fraudulent activities. These hidden interfaces then directed to attacker-owned cashout domains, seamlessly generating fraudulent ad impressions and clicks without user knowledge.

In response to these malicious activities, Google has removed the identified SlopAds applications from its Play Store. To further safeguard its users, Google Play Protect automatically warns against and blocks the installation of known malicious apps, inclusive of those involved in this campaign.

Top charts for Mobile Android

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508647
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735883
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746826
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
497568
downloads

Comments (0)

No comments yet. Be the first to comment!