‘IconAds’ Android Ad Fraud Scheme Exploits Google Play to Target Users

HUMAN’s Satori Threat Intelligence and Research Team has unveiled and successfully disrupted a large-scale Android ad fraud operation named IconAds, involving a network of 352 malicious apps.

These apps covertly load out-of-context advertisements on users’ devices while employing advanced techniques to mask their presence, notably by hiding their app icons.

This stealth approach hampers users from identifying and uninstalling the offending apps. At its peak, the IconAds operation generated approximately 1.2 billion bid requests daily, representing a significant threat to the mobile advertising ecosystem.

This campaign is an evolution of an earlier operation tracked by Satori researchers since 2023.

While previous iterations have been reported by other security organizations, IconAds exhibits novel adaptations and complex tactics not previously disclosed.

Its global footprint is extensive, with the highest concentration of activity detected in Brazil, Mexico, and the United States.

In response, Google has removed all reported IconAds applications from the Play Store. Users benefit from Google Play Protect, which, by default, monitors devices and blocks apps exhibiting malicious behavior.

Additionally, customers leveraging HUMAN’s Ad Fraud Defense services are safeguarded from IconAds-related activity.

Command-and-Control (C2) Infrastructure

Satori’s deep technical analysis revealed that IconAds apps share several sophisticated characteristics that enable their covert operation and resilience against detection.

The attackers employ layered obfuscation tactics including encrypted string arrays, obfuscated Java method names, and native libraries protected by O-MVLL obfuscation to thwart reverse engineering efforts and automated security scans.

Google Play
O-MVLL obfuscated library

Distinctively, IconAds apps obscure network communication parameters using random English words that vary between apps, further complicating detection.

Each IconAds app communicates with a unique, dedicated command-and-control (C2) domain, enabling individualized control and minimizing traceability.

These C2 domains follow a recognizable but broad naming pattern, involving multiple subdomains, sometimes containing a “-test” suffix, and often resolve via the same backend infrastructure.

The C2 communications use consistent JSON message formats with randomized keys carrying device metadata, facilitating ad delivery instructions while maintaining high operational security.

Another critical evasion technique involves setting a malicious activity-alias that replaces the app’s original launcher icon and label.

Using Android’s PackageManager API, these apps disable their default launcher activities and enable decoy aliases with empty or transparent icons.

This effectively renders the apps invisible on the device’s home screen, preventing casual discovery or removal by users.

Out-of-Context Ads

IconAds’ out-of-context advertisements appear persistently regardless of the foreground app or user activity, aggressively monetizing device real estate without consent.

Google Play
Global distribution of IconAds-associated traffic

For example, the app com.works.amazing.colour replaces its icon with a translucent placeholder and shows interstitial ads intermittently, deceiving users into thinking the app is dormant or non-functional.

Some variants even mimic legitimate Google app icons and names like the Google Play Store or Google Home to further conceal their malicious intent.

The campaign demonstrates continuous evolution with recent app variants exhibiting enhanced dynamic evasion capabilities.

Notably, IconAds apps now verify their installation source by validating Google Play Store signatures using the third-party library PairIP.

If the app detects it was sideloaded or installed outside of the Play Store, it terminates execution to avoid dynamic analysis environments often used by researchers.

Additionally, these apps leverage deep linking via third-party platforms to activate malicious behavior selectively, complicating efforts to trigger or observe the fraud during automated testing.

In some cases, malicious payloads are hidden within encrypted DEX files or embedded ELF libraries that contain fraud logic, which is dynamically loaded at runtime.

This modular design allows attackers to update or alter the fraud mechanism without republishing entire apps, increasing flexibility and persistence.

The ongoing sophistication of IconAds highlights the persistent challenges in securing mobile advertising ecosystems against fraud.

The ability to hide app presence, employ multi-layered obfuscation, and dynamically evade analysis makes detection increasingly difficult for conventional security tools.

HUMAN’s research underscores the importance of continuous monitoring, threat intelligence sharing, and stringent vetting of advertising inventory.

Demand Side Platforms (DSPs) should implement strict app-level inventory checks and integrate up-to-date indicators of compromise to filter suspicious bid requests in real time.

Supply Side Platforms (SSPs) are advised to monitor traffic anomalies and demand full transparency in app metadata and developer credentials to enhance trustworthiness.

With Google Play Protect and HUMAN’s Ad Fraud Defense offering robust layers of protection, users and advertisers gain critical safeguards against the IconAds threat.

Nonetheless, the Satori team warns that threat actors behind IconAds will likely continue to refine their tactics, necessitating ongoing vigilance and collaboration across the mobile ad ecosystem.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here