Security researchers at Human Security (formerly White Ops) discovered a massive Android botnet, dubbed Pareto, used to conduct fraud in the Connected TV (CTV) advertising ecosystem.
The Pareto botnet is composed of nearly a million infected mobile Android devices, it was used to emulate the activity of millions of people watching ads on smart TVs and other devices.
“PARETO is nearly a million infected mobile Android devices pretending to be millions of people watching ads on smart TVs and other devices. The botnet used dozens of mobile apps to impersonate or spoof more than 6,000 CTV apps, accounting for an average of 650 million ad requests every day.” reads the analysis published by the experts.
The botnet was first spotted in 2020, it is able to generate an average of 650 million ad requests every day.
Since its discovery, the security firm has been working to mitigate the threat and disrupt the ad-fraud operation with the support of Google, Roku and others.
PARETO works by spoofing signals using malicious Android mobile apps to impersonate consumer TV streaming products running Fire OS, tvOS, Roku OS, and other prominent CTV platforms. The fraudulent activity was very profitable, especially during the ongoing pandemic, experts pointed out that the price for ads on connected TVs is often higher than pricing on mobile devices or on the web.
The PARETO campaign has been very sophisticated and evasive during 2020. Experts noticed that threat actors behind the botnet used a new disguise for their fake traffic for each spoofing cycle.
“HUMAN was able to detect and continuously innovate techniques to protect our customers with HUMAN’s Advertising Integrity solution.” ” continues the report. Finally, after a year of this continuous and effective threat identification and resolution, and driven by a sequence of counter measures and PARETO adaptations, HUMAN and its partners—including Omnicom Media Group, The Trade Desk, Magnite, Google, and Roku—disrupted the operation.”
Human Security experts also uncovered a separate, but-connected, operation targeting the Roku platform with tens of rogue apps on the Roku’s Channel Store.
“The primary operation was associated with 29 Android apps and the secondary operation was associated with one Roku developer delivering the malware to infected devices. These apps have all been removed from the marketplaces on which they were operating, and lists of the apps are available as appendices to HUMAN’s technical analysis of the botnet. Roku has also permanently disconnected the impacted apps from use. ” continues the press release.
The report includes details the list of the malicious apps and info about the C2 infrastructure.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, connected TV)
[adrotate banner=”5″]
[adrotate banner=”13″]
Cryptocurrency exchange Coinbase announced that the recent data breach exposed data belonging to 69,461 individuals.…
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…
A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…
South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…
A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…
China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…
This website uses cookies.