A newly identified threat operation is exploiting one of the most widely used content discovery tools on Android and Chrome devices — Google’s Discovery feed — to deliver malicious push notifications to unsuspecting users across multiple countries.
The operation, named Pushpaganda by researchers, combines AI-generated content, aggressive social engineering, and deceptive browser behavior to manipulate real users into subscribing to harmful notification streams.
Pushpaganda works by injecting fabricated news articles directly into users’ personalized Discovery feeds, which appear on Android home screens and blank Chrome browser tabs.
Threat actors built a network of 113 actor-controlled domains and used artificial intelligence to produce sensationalist headlines and imagery designed to grab attention instantly.
These stories often focused on topics that trigger strong reactions — fake government deposit announcements, alarming tax notices, or wildly unrealistic smartphone deals such as “$1390 IRS Deposit Approved” or “$100 phones with 300MP cameras.”
The content appeared in Discovery feeds either through paid placement or advanced search engine optimization techniques, making it difficult to distinguish from legitimate news at first glance.
Once a user clicked on one of these deceptive articles, they landed on an actor-controlled domain where a browser notification subscription prompt appeared immediately.
Many users clicked “Allow” either to bypass the dialog box or because they believed it was required to access the article they had selected.
That single click marked the beginning of a persistent, OS-level notification stream that completely bypassed standard ad blockers.
The notifications that followed had no connection to the original article and instead delivered fake police arrest warrants, fabricated missed calls from family members, and false bank alerts — all crafted to provoke fear and push users into clicking further.
Analysts at HUMAN’s Satori Threat Intelligence and Research Team identified this operation and this team was led by researchers Louisa Abel, Vikas Parthasarathy, João Santos, and Adam Sell.
They noted that at its peak, Pushpaganda generated approximately 240 million bid requests tied to its domains within a single seven-day window.
The campaign initially targeted users in India before expanding its reach to Australia, the United States, and additional regions.
The research team shared all 113 identified Pushpaganda-associated domains with Google, and Google confirmed that a fix has since been deployed to prevent this type of low-quality, manipulative content from surfacing in Discovery feeds.
.webp)
The scale and reach of this operation highlight a growing trend of threat actors weaponizing trusted content distribution platforms.
Since Google’s Discovery feed is a built-in system feature rather than a downloadable app, users have limited control over what appears in it, making it an unusually effective entry point for this kind of social engineering attack.
How the Deceptive UI and JavaScript Rotation Worked
One of the more technically sophisticated elements of Pushpaganda was its use of deceptive interface buttons and a JavaScript-based tab rotation mechanism.
When users visited an actor-controlled domain, they encountered buttons labeled “Apply Now,” “Claim Now,” or “Join WhatsApp” — language that implied a legitimate action.
Rather than completing the advertised function, these buttons used JavaScript to open new browser tabs pointing to additional Pushpaganda-linked domains.
.webp)
In the background tab left open by the click, a separate JavaScript algorithm took over, rotating the inactive tab through a predetermined cycle of actor-owned pages.
This mechanism quietly loaded ads and extended session durations on those pages, making the sites appear as high-quality traffic sources to advertising networks.
The result was inflated ad revenue for the threat actors — entirely generated from users who never intended to interact with those pages.
.webp)
Satori researchers also observed deepfake videos and images embedded in ads on these domains, some falsely depicting well-known celebrities and medical professionals to further exploit user trust at scale.
Users who believe they may have subscribed to Pushpaganda-linked notifications should immediately review their browser notification permissions and revoke access for any unfamiliar or suspicious domains.
On Chrome for Android, this can be done through Settings → Site Settings → Notifications. Users should also avoid clicking “Allow” on notification prompts from websites they do not recognize or trust, especially those reached through news feed links.
From an organizational standpoint, security teams are advised to monitor for unusual push notification subscription activity on managed devices and treat any OS-level alerts mimicking legal or financial authorities as indicators of a social engineering attempt.
Satori researchers continue to monitor for new Pushpaganda-associated domains and any signs of threat actor adaptation, recommending that ad fraud and click fraud detection measures remain active across all web-facing environments.
Follow us on Google News, LinkedIn, and X to Get More Instant Updates, Set CSN as a Preferred Source in Google.

