An adversary could seek to generate fraudulent advertising revenue from mobile devices, for example by triggering automatic clicks of advertising links without user involvement.
| ID | Name | Description |
|---|---|---|
| S0440 | Agent Smith |
Agent Smith shows fraudulent ads to generate revenue.[1] |
| S0525 | Android/AdDisplay.Ashas |
Android/AdDisplay.Ashas can generate revenue by automatically displaying ads.[2] |
| S0290 | Gooligan | |
| S0322 | HummingBad |
In July 2016, HummingBad generated more than $300,000 per month in revenue from installing fraudulent apps and displaying malicious advertisements.[4] |
| S0321 | HummingWhale |
HummingWhale generates revenue by displaying fraudulent ads and automatically installing apps. When victims try to close the ads, HummingWhale runs in a virtual machine, creating a fake ID that allows the perpetrators to generate revenue.[5] |
| S0325 | Judy |
Judy uses infected devices to generate fraudulent clicks on advertisements to generate revenue.[6] |
| S0419 | SimBad |
SimBad generates fraudulent advertising revenue by displaying ads in the background and by opening the browser and displaying ads.[7] |
| S0545 | TERRACOTTA |
TERRACOTTA has generated non-human advertising impressions.[8] |
| S0424 | Triada |
Triada can redirect ad banner URLs on websites visited by the user to specific ad URLs.[9][10] |
| S0494 | Zen |
| ID | Mitigation | Description |
|---|---|---|
| M1005 | Application Vetting |