Satori Threat Intelligence Exposes Trapdoor Fraud Operation

View organization page for HUMAN

39,801 followers

🚨 New research from the Satori Threat Intelligence team is live: Trapdoor — a massive fraud operation disrupted in collaboration with Google . 455 malicious Android apps. 183 threat-actor-controlled domains. 24M+ app downloads. 659M bid requests per day at peak activity. Trapdoor operated as a self-sustaining fraud pipeline, using malvertising, stealthy app installs, and advanced anti-analysis techniques to scale mobile ad fraud globally. For ad tech and security teams, this is a reminder that it’s not enough to look only at app behavior. Defenders must also identify and disrupt the shared cashout infrastructure powering multiple operations simultaneously. Proud of the incredible work from the Satori team and our partners at Google to expose and disrupt this operation. https://lnkd.in/gJvMYuG3

  • No alternative text description for this image

Trapdoor is a good reminder that these operations are becoming more creative, more connected, and harder to spot if you look at only one piece at a time. Research like this helps all of us better understand the patterns behind how modern fraud actually works.

To view or add a comment, sign in

Explore content categories