{"id":343343,"date":"2025-07-23T12:00:00","date_gmt":"2025-07-23T12:00:00","guid":{"rendered":"https:\/\/integralads.com\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/"},"modified":"2025-07-23T15:12:44","modified_gmt":"2025-07-23T15:12:44","slug":"threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices","status":"publish","type":"post","link":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/","title":{"rendered":"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"343343\" class=\"elementor elementor-343343 elementor-343317\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-da7cd60 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"12962\" data-id=\"da7cd60\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ece7b52\" data-eae-slider=\"64711\" data-id=\"ece7b52\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ccca0fa elementor-widget elementor-widget-text-editor\" data-id=\"ccca0fa\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76e327e elementor-widget elementor-widget-heading\" data-id=\"76e327e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Scheme\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e66e3a elementor-widget elementor-widget-text-editor\" data-id=\"7e66e3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The IAS Threat Lab has uncovered a large-scale, fast-evolving ad fraud operation known as Mirage \u2014 a sprawling network of fraudulent Android apps designed to hijack user devices and exploit ad ecosystems at massive scale.<\/span><\/p><p><span style=\"font-weight: 400;\">Mirage apps masquerade as helpful utilities like phone cleaners and battery boosters. On the surface, they appear harmless. But behind the scenes, they use cloaking techniques and bot-driven installs to quietly switch on aggressive ad fraud behavior once installed through specific referral links. The result: full-screen interstitial ads that interrupt users out of context, with no real utility provided by the apps themselves.<\/span><\/p><p><span style=\"font-weight: 400;\">Threat Lab researchers have identified over 300 Mirage-linked app IDs, collectively amassing more than 70 million downloads and generating over 350 million daily bid requests. These apps were built with one goal in mind: monetize unsuspecting users through persistent, non-consensual advertising.<\/span><\/p><p><span style=\"font-weight: 400;\">Mirage marks a troubling evolution of tactics first seen in the Threat Lab-discovered <\/span><a href=\"https:\/\/integralads.com\/insider\/ias-threat-lab-fraud-scheme-fake-android-apps\/\"><span style=\"font-weight: 400;\"><span style=\"text-decoration: underline;\">Vapor scheme<\/span><\/span><\/a><span style=\"font-weight: 400;\">. Unlike Vapor apps, which gradually stripped away features over time, Mirage apps are designed to mislead from the outset \u2014 launching with fake installs to climb app store rankings and turning on monetization only when real users start downloading.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b82f8cc elementor-widget elementor-widget-heading\" data-id=\"b82f8cc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Takedown\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68a9961 elementor-widget elementor-widget-text-editor\" data-id=\"68a9961\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">IAS collaborated directly with Google to take swift action against the Mirage operation. Based on Threat Lab intelligence, all identified Mirage apps have been removed from the Google Play Store. Google Play Protect is actively alerting users and will disable these apps automatically \u2014 even when installed outside of the Play Store ecosystem.<\/span><\/p><p><span style=\"font-weight: 400;\">IAS continues to monitor Mirage&#8217;s activity, as its operators rapidly adapt through reskinned apps, recycled developer accounts, and global distribution across North America, Europe, and Asia-Pacific.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3c28c33 elementor-widget elementor-widget-heading\" data-id=\"3c28c33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Want to understand Mirage\u2019s full scale and how IAS unraveled the scheme? The full report includes:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23fcfdb elementor-widget elementor-widget-text-editor\" data-id=\"23fcfdb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A breakdown of Mirage\u2019s app behavior and install patterns<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tactics used to cloak fraud from store reviewers<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Case study of a Mirage app that reached #1 in the U.S.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Timeline of IAS and Google\u2019s coordinated takedown<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0a4cfc dark-green-buttton elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e0a4cfc\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"#elementor-action%3Aaction%3Dpopup%3Aopen%26settings%3DeyJpZCI6MjkyNjM3LCJ0b2dnbGUiOmZhbHNlfQ%3D%3D\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">ACCESS THE FULL REPORT<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem. <\/p>\n","protected":false},"author":59,"featured_media":343330,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[303,304,313,778],"tags":[],"class_list":["post-343343","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-featured-apac-2","category-insights-apac-2","category-mobile-in-app-apac-2","category-threat-lab-apac"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices - Integral Ad Science<\/title>\n<meta name=\"description\" content=\"What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices\" \/>\n<meta property=\"og:description\" content=\"What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Integral Ad Science\" \/>\n<meta property=\"article:published_time\" content=\"2025-07-23T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T15:12:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integralads.com\/wp-content\/uploads\/2025\/07\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"IAS Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@integralads\" \/>\n<meta name=\"twitter:site\" content=\"@integralads\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"IAS Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/\"},\"author\":{\"name\":\"IAS Team\",\"@id\":\"https:\\\/\\\/integralads.com\\\/#\\\/schema\\\/person\\\/dbb1eb8d41477c4193f06c013629e755\"},\"headline\":\"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices\",\"datePublished\":\"2025-07-23T12:00:00+00:00\",\"dateModified\":\"2025-07-23T15:12:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/\"},\"wordCount\":374,\"publisher\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integralads.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png\",\"articleSection\":[\"Featured\",\"Insights\",\"Mobile &amp; In-App\",\"Threat Lab\"],\"inLanguage\":\"en-APAC\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/\",\"url\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/\",\"name\":\"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices - Integral Ad Science\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/integralads.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png\",\"datePublished\":\"2025-07-23T12:00:00+00:00\",\"dateModified\":\"2025-07-23T15:12:44+00:00\",\"description\":\"What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-APAC\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-APAC\",\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/integralads.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png\",\"contentUrl\":\"https:\\\/\\\/integralads.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png\",\"width\":500,\"height\":500,\"caption\":\"Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of IRIS.TV_Thou (1)\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/integralads.com\\\/apac\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/integralads.com\\\/#website\",\"url\":\"https:\\\/\\\/integralads.com\\\/\",\"name\":\"Integral Ad Science\",\"description\":\"The Hidden Cost of MFA Webinar\",\"publisher\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/integralads.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-APAC\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/integralads.com\\\/#organization\",\"name\":\"Integral Ad Science\",\"url\":\"https:\\\/\\\/integralads.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-APAC\",\"@id\":\"https:\\\/\\\/integralads.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/integralads.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/IAS_Square-Logo-600x600-1.png\",\"contentUrl\":\"https:\\\/\\\/integralads.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/IAS_Square-Logo-600x600-1.png\",\"width\":600,\"height\":600,\"caption\":\"Integral Ad Science\"},\"image\":{\"@id\":\"https:\\\/\\\/integralads.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/integralads\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/integralads.com\\\/#\\\/schema\\\/person\\\/dbb1eb8d41477c4193f06c013629e755\",\"name\":\"IAS Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-APAC\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g\",\"caption\":\"IAS Team\"},\"url\":\"https:\\\/\\\/integralads.com\\\/apac\\\/insider\\\/author\\\/ias-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices - Integral Ad Science","description":"What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/","og_locale":"en_US","og_type":"article","og_title":"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices","og_description":"What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.","og_url":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/","og_site_name":"Integral Ad Science","article_published_time":"2025-07-23T12:00:00+00:00","article_modified_time":"2025-07-23T15:12:44+00:00","og_image":[{"width":500,"height":500,"url":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/07\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png","type":"image\/png"}],"author":"IAS Team","twitter_card":"summary_large_image","twitter_creator":"@integralads","twitter_site":"@integralads","twitter_misc":{"Written by":"IAS Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#article","isPartOf":{"@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/"},"author":{"name":"IAS Team","@id":"https:\/\/integralads.com\/#\/schema\/person\/dbb1eb8d41477c4193f06c013629e755"},"headline":"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices","datePublished":"2025-07-23T12:00:00+00:00","dateModified":"2025-07-23T15:12:44+00:00","mainEntityOfPage":{"@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/"},"wordCount":374,"publisher":{"@id":"https:\/\/integralads.com\/#organization"},"image":{"@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/07\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png","articleSection":["Featured","Insights","Mobile &amp; In-App","Threat Lab"],"inLanguage":"en-APAC"},{"@type":"WebPage","@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/","url":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/","name":"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices - Integral Ad Science","isPartOf":{"@id":"https:\/\/integralads.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#primaryimage"},"image":{"@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/07\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png","datePublished":"2025-07-23T12:00:00+00:00","dateModified":"2025-07-23T15:12:44+00:00","description":"What happens when utility apps turn into full-screen ad machines? The IAS Threat Lab has uncovered a global ad fraud scheme \u2014 codenamed \u201cMirage\u201d \u2014 designed to mislead users, inflate installs, and exploit the mobile advertising ecosystem.","breadcrumb":{"@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#breadcrumb"},"inLanguage":"en-APAC","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-APAC","@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#primaryimage","url":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/07\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png","contentUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2025\/07\/Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-Copy-of-IRIS.TV_Thou-1.png","width":500,"height":500,"caption":"Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of Copy of IRIS.TV_Thou (1)"},{"@type":"BreadcrumbList","@id":"https:\/\/integralads.com\/apac\/insider\/threat-lab-uncovers-sophisticated-fraud-scheme-targeting-android-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integralads.com\/apac\/"},{"@type":"ListItem","position":2,"name":"IAS Threat Lab Uncovers Sophisticated Fraud Scheme Targeting Android Devices"}]},{"@type":"WebSite","@id":"https:\/\/integralads.com\/#website","url":"https:\/\/integralads.com\/","name":"Integral Ad Science","description":"The Hidden Cost of MFA Webinar","publisher":{"@id":"https:\/\/integralads.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integralads.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-APAC"},{"@type":"Organization","@id":"https:\/\/integralads.com\/#organization","name":"Integral Ad Science","url":"https:\/\/integralads.com\/","logo":{"@type":"ImageObject","inLanguage":"en-APAC","@id":"https:\/\/integralads.com\/#\/schema\/logo\/image\/","url":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png","contentUrl":"https:\/\/integralads.com\/wp-content\/uploads\/2023\/10\/IAS_Square-Logo-600x600-1.png","width":600,"height":600,"caption":"Integral Ad Science"},"image":{"@id":"https:\/\/integralads.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/integralads"]},{"@type":"Person","@id":"https:\/\/integralads.com\/#\/schema\/person\/dbb1eb8d41477c4193f06c013629e755","name":"IAS Team","image":{"@type":"ImageObject","inLanguage":"en-APAC","@id":"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9f16c6f50650cad445307fb6d3f416dd3bd43e25c36941c0d50911615af841de?s=96&d=mm&r=g","caption":"IAS Team"},"url":"https:\/\/integralads.com\/apac\/insider\/author\/ias-team\/"}]}},"_links":{"self":[{"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/posts\/343343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/comments?post=343343"}],"version-history":[{"count":0,"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/posts\/343343\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/media\/343330"}],"wp:attachment":[{"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/media?parent=343343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/categories?post=343343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integralads.com\/apac\/wp-json\/wp\/v2\/tags?post=343343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}