Google eliminated 224 malicious Android applications from its Play Store after researchers discovered they were part of an ad fraud operation called "SlopAds" that generated 2.3 billion fraudulent ad requests daily.
BleepingComputer reported the malicious apps were downloaded over 38 million times across 228 countries and territories. The campaign generated 2.3 billion bid requests per day, with the highest concentration of ad impressions coming from the United States (30%), India (10%), and Brazil (7%). The apps used obfuscation and steganography techniques to hide malicious behavior from Google's security systems and detection tools. Google has since removed all identified SlopAds applications from the Play Store and updated Android's Google Play Protect to warn users about any remaining installations on their devices.
The SlopAds campaign employed multiple layers of evasion tactics:
Researchers explained the campaign's naming: "Researchers dubbed this operation 'SlopAds' because the apps associated with the threat have the veneer of being mass produced, a la 'AI slop', and as a reference to a collection of AI-themed applications and services hosted on the threat actors' C2 server."
Researchers warned that "the sophistication of the ad fraud campaign indicates that the threat actors will likely adapt their scheme to try again in future attacks."
Ad fraud campaigns like SlopAds exploit the mobile advertising system by generating fake ad impressions and clicks to steal revenue from legitimate advertisers. Steganography is a technique that hides malicious code within seemingly innocent files like images, making detection difficult. These campaigns often use evasion techniques to bypass app store security reviews and appear as legitimate applications until activated by specific conditions.
Healthcare organizations should immediately audit their approved mobile applications and implement strict mobile device management policies. The nature of campaigns like SlopAds shows that relying solely on app store security is insufficient for protecting sensitive healthcare data and maintaining HIPAA compliance.
Related: HIPAA Compliant Email: The Definitive Guide
Users should review their installed apps and rely on Google Play Protect alerts for warnings.
Google enhanced Play Protect scanning and detection for hidden malicious behaviors.
Yes, third-party app stores often lack the same level of security scrutiny.
Yes, attackers may mimic trusted categories to maximize downloads and ad revenue.