Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users

A sophisticated mobile ad fraud operation dubbed “IconAds” has infiltrated Android devices worldwide through 352 malicious applications distributed via Google Play Store, generating up to 1.2 billion fraudulent bid requests daily at its peak.

The scheme represents a significant evolution in mobile advertising fraud, employing advanced obfuscation techniques to hide malicious apps from users while displaying intrusive out-of-context advertisements.

The operation affected users globally, with the highest concentrations of fraudulent traffic originating from Brazil (16.35%), Mexico (14.33%), and the United States (9.5%).

Google News

Unlike traditional adware, IconAds applications deliberately conceal their presence by replacing their visible icons with transparent rectangles and empty labels, making it nearly impossible for users to identify and remove the offending applications from their devices.

Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users
Global distribution of IconAds-associated traffic (Source – Human Security)

Human Security analysts identified the operation as an expansion of a threat they have been monitoring since 2023, noting significant tactical adaptations that emerged in October 2023.

The researchers discovered that IconAds represents a new level of sophistication in mobile ad fraud, combining multiple layers of obfuscation with innovative persistence mechanisms.

The malware’s most distinctive feature lies in its icon-hiding mechanism, which exploits Android’s activity-alias functionality to replace legitimate app icons with invisible placeholders.

This technique involves declaring a malicious activity-alias in the application manifest that overrides the default launcher activity after installation.

Advanced Persistence and Obfuscation Tactics

The IconAds operation employs a sophisticated persistence mechanism centered around Android’s setComponentEnabledSetting method, which allows applications to dynamically modify their visible components.

Upon installation, the malicious apps initially display legitimate icons and names to avoid suspicion. However, once launched, they execute code that enables a hidden activity-alias while disabling the original launcher activity.

The technical implementation involves creating an activity-alias with an empty android:label attribute and a transparent drawable resource.

This approach ensures that even after device reboots, the malicious app remains hidden while continuing to display intrusive advertisements.

Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users
Ads loaded out of context (Source – Human Security)

Some variants take the deception further by mimicking Google’s own applications, using modified versions of the Play Store icon and “Google Home” branding to appear as legitimate system components.

The operation’s command-and-control infrastructure demonstrates remarkable sophistication, with each malicious app communicating through unique domains following a consistent pattern.

These domains employ seemingly random English words to obfuscate device information during network communications, making detection and analysis significantly more challenging for security researchers.

Google has since removed all identified IconAds applications from the Play Store, and users with Google Play Protect enabled receive automatic protection against these threats.

The discovery highlights the ongoing evolution of mobile ad fraud and the need for continued vigilance in app store security measures.

Investigate live malware behavior, trace every step of an attack, and make faster, smarter security decisions -> Try ANY.RUN now


Source link