Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Massive Android Ad Fraud ‘IconAds’ Leverages Google Play to Attack Phone Users

Posted on July 4, 2025July 4, 2025 By CWS

A complicated cellular advert fraud operation dubbed “IconAds” has infiltrated Android gadgets worldwide via 352 malicious functions distributed through Google Play Retailer, producing as much as 1.2 billion fraudulent bid requests day by day at its peak.

The scheme represents a big evolution in cellular promoting fraud, using superior obfuscation strategies to cover malicious apps from customers whereas displaying intrusive out-of-context ads.

The operation affected customers globally, with the best concentrations of fraudulent visitors originating from Brazil (16.35%), Mexico (14.33%), and the USA (9.5%).

In contrast to conventional adware, IconAds functions intentionally conceal their presence by changing their seen icons with clear rectangles and empty labels, making it practically unimaginable for customers to determine and take away the offending functions from their gadgets.

World distribution of IconAds-associated visitors (Supply – Human Safety)

Human Safety analysts recognized the operation as an growth of a risk they’ve been monitoring since 2023, noting important tactical diversifications that emerged in October 2023.

The researchers found that IconAds represents a brand new degree of sophistication in cellular advert fraud, combining a number of layers of obfuscation with progressive persistence mechanisms.

The malware’s most distinctive function lies in its icon-hiding mechanism, which exploits Android’s activity-alias performance to switch professional app icons with invisible placeholders.

This system entails declaring a malicious activity-alias within the software manifest that overrides the default launcher exercise after set up.

Superior Persistence and Obfuscation Ways

The IconAds operation employs a complicated persistence mechanism centered round Android’s setComponentEnabledSetting methodology, which permits functions to dynamically modify their seen parts.

Upon set up, the malicious apps initially show professional icons and names to keep away from suspicion. Nonetheless, as soon as launched, they execute code that permits a hidden activity-alias whereas disabling the unique launcher exercise.

The technical implementation entails creating an activity-alias with an empty android:label attribute and a clear drawable useful resource.

This method ensures that even after gadget reboots, the malicious app stays hidden whereas persevering with to show intrusive ads.

Advertisements loaded out of context (Supply – Human Safety)

Some variants take the deception additional by mimicking Google’s personal functions, utilizing modified variations of the Play Retailer icon and “Google House” branding to seem as professional system parts.

The operation’s command-and-control infrastructure demonstrates exceptional sophistication, with every malicious app speaking via distinctive domains following a constant sample.

These domains make use of seemingly random English phrases to obfuscate gadget info throughout community communications, making detection and evaluation considerably tougher for safety researchers.

Google has since eliminated all recognized IconAds functions from the Play Retailer, and customers with Google Play Shield enabled obtain computerized safety in opposition to these threats.

The invention highlights the continued evolution of cellular advert fraud and the necessity for continued vigilance in app retailer safety measures.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Android, Attack, Fraud, Google, IconAds, Leverages, Massive, Phone, Play, Users

Post navigation

Previous Post: Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
Next Post: Multiple PHP Vulnerabilities Allow SQL Injection & DoS Attacks

Related Posts

Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely Critical Veeam Backup RCE Vulnerabilities Let Attackers Execute Malicious Code Remotely Cyber Security News
Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Authentication Coercion Attack Tricks Windows Machines into Revealing Credentials to Attack-controlled Servers Cyber Security News
Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers Cyber Security News
Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Warlock Ransomware Actors Exploiting Sharepoint ToolShell Zero-Day Vulnerability in New Attack Wave Cyber Security News
Critical OpenSSH Vulnerability Exposes Moxa Ethernet Switches to Remote Code Execution Critical OpenSSH Vulnerability Exposes Moxa Ethernet Switches to Remote Code Execution Cyber Security News
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark