SimBad was a strain of adware on the Google Play Store, distributed through the RXDroider Software Development Kit. The name "SimBad" was derived from the fact that most of the infected applications were simulator games. The adware was controlled using an instance of the open source framework Parse Server.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Mobile | T1624 | .001 | Event Triggered Execution: Broadcast Receivers |
SimBad registers for the |
Mobile | T1643 | Generate Traffic from Victim |
SimBad generates fraudulent advertising revenue by displaying ads in the background and by opening the browser and displaying ads.[1] |
|
Mobile | T1628 | .001 | Hide Artifacts: Suppress Application Icon | |
Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |