HUMAN Security’s Satori Threat Intelligence and Research Team uncovered and took down a sophisticated ad fraud operation dubbed VASTFLUX consisting of more than 1,700 spoofed apps targeting 120 publishers.
The ads ran in apps across nearly 11 million devices, and reached a peak volume of 12 billion ad requests daily.
The team identified unexpected web traffic patterns passing through a popular app, and while digging through that app, found what the company refers to as a “rabbit hole” that just got deeper.
There are substantial differences in how and where ads are delivered. Ads running in apps pass less information to verification providers than ads that run on pages visited within a web browser.
That information gap appeals to fraudsters, so they may target ads that run in more restricted environments with hope it will take longer for the scheme to be spotted and stopped.
Those behind VASTFLUX must have known this and targeted not just in-app advertising, but in-app advertising on iOS, where the environment is especially strict due to Apple’s latest privacy policies, according to the company.
The operation has been shut down, but HUMAN continues to monitor the VASTFLUX operators.
The name of the malware comes from the concept of fast...
Read Full Story: https://news.google.com/__i/rss/rd/articles/CBMibWh0dHBzOi8vd3d3Lm1lZGlhcG9zdC5jb20vcHVibGljYXRpb25zL2FydGljbGUvMzgxNzEyL2h1bWFuLXNodXRzLWRvd24tb3BlcmF0aW9uLWFjY291bnRpbmctZm9yLTEyYi1mcmF1Lmh0bWzSAQA?oc=5
Your content is great. However, if any of the content contained herein violates any rights of yours, including those of copyright, please contact us immediately by e-mail at media[@]kissrpr.com.