Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. (jamf.com) MobiDash: Evolution from Adware to a Sophisticated Android Fraud Platform with Ghost Clicks and Proxy Infrastructure

(jamf.com) MobiDash: Evolution from Adware to a Sophisticated Android Fraud Platform with Ghost Clicks and Proxy Infrastructure

Scheduled Pinned Locked Moved Uncategorized
cybersecuritythreatintel
1 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.comO This user is from outside of this forum
    orlysec@swecyb.com
    wrote last edited by
    #1

    (jamf.com) MobiDash: Evolution from Adware to a Sophisticated Android Fraud Platform with Ghost Clicks and Proxy Infrastructure

    MobiDash has evolved from adware into a sophisticated Android fraud platform, combining click injection, phantom ad rendering, and residential proxy infrastructure orchestrated by a dynamic C2 server.

    In brief - MobiDash is a modular Android fraud platform embedded in repackaged apps, using advanced ad fraud and proxy monetization. It fabricates user interactions via VirtualDisplay and synthetic touch events, while its C2 server enables live code updates, posing risks to users and advertisers.

    Technically - MobiDash injects malicious payloads into legitimate APKs via an automated patcher, using SQLCipher for encrypted storage and emulator checks for evasion. It employs reflection to replace base contexts, spoofs ad SDKs via PackageManager interception, and renders phantom ads using VirtualDisplay. The C2 server delivers interaction scripts, JavaScript injections, and synthetic touch sequences. Proxy infrastructure (Hopmon SDK, SOCKS5 with SSH tunnels) enables bandwidth monetization and geographic fraud.

    Source: https://www.jamf.com/blog/mobidash-android-ad-fraud-click-injection-analysis/

    #Cybersecurity #ThreatIntel

    1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    Reply
    • Reply as topic
    Log in to reply
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes


    • Login

    • Login or register to search.
    • First post
      Last post
    0
    • Categories
    • Recent
    • Tags
    • Popular
    • World
    • Users
    • Groups