Researchers: Nico Agnese, Vikas Parthasarathy, Joao Santos, Adam Sell, Inna Vasilyeva
In this post:
“Modern defense” is the strategy behind protecting the internet and the advertising ecosystem from fraud through a combination of internet observability, collective protection, and actionable intelligence with disruptions of fraud operations when they’re uncovered. This strategy is the basis of how HUMAN works to safeguard the internet from digital attacks, disrupt the economics of cybercrime, and reduce the cost of collective protection for customers.
Three years ago, in August of 2019, HUMAN’s (then White Ops) Satori team reported about a collection of 40+ Android apps openly committing multiple types of advertising fraud. That investigation, which we named Poseidon after the malicious code within the apps, resulted in Google removing the apps from their Play Store.
A disruption that results in dismantling the infrastructure powering a fraud scheme is rare. In the case of the original Poseidon operation, we weren’t in a position to disrupt the infrastructure in that way, but we were able to work with the Google Play Store team to remove the malicious apps and ensure that the proliferation of that wave of the scheme stopped.
Poseidon is back again, unsurprisingly. This adaptation, which we’ve dubbed Scylla, showcases new tactics and techniques these threat actors have deployed to try and cover their tracks better than in earlier adaptations.
They have also expanded their attack to more parts of the digital advertising ecosystem, further underscoring the importance of collective protection to stop fraud at the source:
Before we can dive into the specifics of how the Charybdis and Scylla operations worked, it’s helpful to have the context of how the original Poseidon phase of the scheme functioned and how the Satori team found it.
The 2019 Poseidon operation consisted of more than 40 Android apps openly committing ad fraud within their code. The apps in question displayed ads out of context or hidden from view of the device user, both of which are classic mechanisms within the broader ad fraud category of Misleading User Interface (PDF).
What made the Poseidon operation interesting was its use of “receivers” to trigger these ads to load. Receivers are, generally speaking, useful little bits of code that tell an app when something has changed with respect to the device. For example, a receiver monitors when a phone has been put into Airplane Mode, and then instructs the app to stop trying to connect to the internet until Airplane Mode is turned off again.
However, well-intended and useful elements of code can be twisted to serve criminal goals. In the case of Poseidon, a receiver designed to determine if the phone was on and in use—a USER.PRESENT receiver—was key to instructing the host apps to call for ads to be shown out-of-context or hidden from the user’s actual view.
The threat actors behind Poseidon didn’t cover their tracks very well, though, as all of the code they built into the apps to handle the fraud was out in the open. Once the Satori team reverse-engineered the code segments named for Greek mythological figures—hence, “Poseidon”—the fraud tactics were entirely laid bare. There was no real attempt to obscure the intention of the code. That would change in future iterations of the scheme.
Following the original Poseidon attack, which we worked closely with Google’s Play Store team to halt, the Satori team kept an eye on the threat actors to see how they would respond.
This phase of fraud-fighting, the adaptation phase, is a crucial part of changing the economics of cybercrime. Every fraud scheme is a race against time for a threat actor: the fraudsters only have until their scheme is shut down to reap enough profit to recoup their cost of developing and deploying it in the first place. The more that organizations can work together and share information, the more threat-hunters like Satori can discover these fraud schemes and shrink the criminal’s profit window. Eventually, the cycle of operation discovery and dismantling becomes so short that fraudsters won’t have enough time to recoup even their costs, so they’ll move on to another target.
In the later part of 2020 and early into 2021, the Satori team uncovered the second wave of this threat actor’s scheme. This iteration, which we’ve dubbed Charybdis (named for Poseidon’s daughter), evolved from the Poseidon operation in two key areas:
HUMAN’s Satori team has uncovered a collection of 75+ apps on Google’s Play Store and 10+ apps on Apple’s App Store that contained obfuscated code similar to Charybdis. This third and latest phase of the operation is named for Scylla, Poseidon’s granddaughter and a sea monster like Charybdis. These apps, when installed, commit several different flavors of advertising fraud:
Also new in the Scylla attack is the expansion from targeting advertising SDKs focused on Android apps into targeting iOS apps as well:
Wood Sculptor, an iOS app associated with Scylla
Source: Satori Threat Intelligence and Research Team
Above, you can see a game called Wood Sculptor. The app is a knock-off of a popular game in which the user slices a path on a flat surface to allow a predetermined shape to pass through the resulting opening. Satori researchers who downloaded Wood Sculptor never saw any ads displayed during the game’s operation.
Packet capture from Wood Sculptor
Source: Satori Threat Intelligence and Research Team
Above, a packet capture of activity from Wood Sculptor. Note the numerous calls to ad servers. Below, execution traces show additional web views where the ads called above are rendered invisible to the user.
UI elements identifying the location of webviews for ads rendered through Wood Sculptor
Source: Satori Threat Intelligence and Research Team
Many of the operations that our Satori team has uncovered use app or bundle ID spoofing as a primary fraud mechanism. Our PARETO investigation, for example, uncovered 29 Android apps that were pretending to be more than 6,000 CTV-based apps, which generally carry higher prices for advertisers than the average mobile game.
In layman’s terms, the threat actors code their apps to pretend to be other apps for advertising purposes, often because the app they’re pretending to be is worth more to an advertiser than the app would be by itself. They do this by inserting a different “bundle ID” or “app ID” (think driver’s license) in the code. Additionally, since some ad verification platforms can catch tactics like these by looking for frequently-faked bundle IDs, the threat actors will cycle through these IDs to avoid getting caught.
The apps in the Scylla operation are instructed which bundle ID to use by a remote command-and-control (C2) server, which tells the app which bundle ID to dynamically insert in the code for that specific impression opportunity, all in a matter of milliseconds.
BundleId spoofing within Scylla
Source: Satori Threat Intelligence and Research Team
The above screenshot is taken from a game called “Lady Run”. The bundle ID, however, names a different app entirely, a game called “War in Painting”.
Response from C2 server with spoofing instructions
Source: Satori Threat Intelligence and Research Team
Here is a decrypted snippet of the C2 server’s response. The app, in this case, is being told to mimic the app ID of a game called Balloon Shooter.
Many mobile apps show an ad as part of their loading screen - it’s a common enough mechanism that most of us wouldn’t think twice about seeing an ad when opening an app.
What’s not common, however, is for the app to tell advertising platforms that it has displayed an ad to the user without having ever actually done so.
Loading a Scylla-associated app
Source: Satori Threat Intelligence and Research Team
The above gif seems straightforward - a game is opened, there’s a brief loading screen, and then the game is ready to play. However, what the phone user does not see is that multiple virtual screens (aka “webviews”) are launched in a way hidden from the user. These webviews are loaded with ads, tricking advertisers into paying for fake impressions to an audience that is never there.
WebView of traffic of the Scylla-associated app
Source: Satori Threat Intelligence and Research Team
As you can see in the above log, several windows rendered…but not where the user could see them. Here is a sample of the actual ads which were “loaded” to the off screen WebViews:
Source: Satori Threat Intelligence and Research Team
Earlier in this post, we described the purpose of Receivers within apps: they’re helpful in determining when a device is being actively used (or not) and when a device is well-suited for an ad to run (or not). Scylla’s designers abuse these device functions to find the ideal times to “serve” ads when they won't actually be seen. To fully understand how they accomplished this, we have to start with the JobScheduler.
View of JobScheduler within a Scylla-associated app
Source: Satori Threat Intelligence and Research Team
JobScheduler schedules a job for Android apps or devices, as the name might suggest. In the Scylla operation, JobScheduler tells the app to run certain activities (like ads) when the correct conditions are met. To figure out if those conditions are met, the apps use Receivers.
JobScheduler triggering on on/off/user_present within a Scylla-associated app
Source: Satori Threat Intelligence and Research Team
Above, receivers determine if a device’s screen is on or off and whether the device is actively in use. These determinations feed into the apps’ logic about when and where to show ads.
Listeners triggering a call to the C2 server
Source: Satori Threat Intelligence and Research Team
Much of what you see above is common to what the Satori team witnessed in the Poseidon operation. What’s new in Scylla is how the apps fake actual clicks of the ads in question. Fake clicks can have multiple benefits for the fraudster: for ad networks that bill on a views model, clicks demonstrate effectiveness, which makes advertisers want to stick around. But some other ad networks bill by the click, which incentivizes the fraudster to just fake the clicks to get paid.
Code within Scylla-associated apps log click locations and save them to later fake clicks
Source: Satori Threat Intelligence and Research Team
Above, the host apps track where real clicks happen on the device and store that information to later fake clicks.
As noted above, one of the other key differences between the original Poseidon operation and the latest Scylla operation is how well the threat actors manage to cover their tracks. Many of the screenshots above may be difficult to parse for the average observer because bits of the code have been “renamed” in an effort to make it harder for security researchers like our Satori team to reverse engineer.
Above, code from the original Poseidon attack stage with an unobfuscated command. Below, a Scylla app with the same command, now obfuscated with Allatori.
Source: Satori Threat Intelligence and Research Team
Additionally, the bad actors behind Scylla used an unpaid, demo version of Allatori:
Example of use of Allatori code obfuscation tool, deobfuscated for investigation purposes.
Source: Satori Threat Intelligence and Research Team
HUMAN’s Satori team has worked closely with the Google Play Store and Apple App Store to ensure that all of the apps we’ve identified as being a part of the Scylla operation have been removed from public access. We’ve also worked closely with advertising SDK developers to mitigate the impact of the operation to their processes and their advertising partners. Our researchers will continue to monitor the threat actors behind the Poseidon, Charybdis, and Scylla operations for further adaptation.
Customers of HUMAN’s MediaGuard solution are protected from fraud perpetrated by the Scylla operators.
HUMAN and the Satori team recommend the following:
The below is a list of all of the apps associated with each of the Poseidon family of operations.
Scylla:
OS |
sha256 hash |
Name |
Package |
Est. installs |
iOS |
n/a |
Loot the Castle |
com.loot.rcastle.fight.battle (id1602634568) |
n/a |
iOS |
n/a |
Run Bridge |
com.run.bridge.race (id1584737005) |
n/a |
iOS |
n/a |
Shinning Gun |
com.shinning.gun.ios (id1588037078) |
n/a |
iOS |
n/a |
Racing Legend 3D |
com.racing.legend.like (id1589579456) |
n/a |
iOS |
n/a |
Rope Runner |
com.rope.runner.family (id1614987707) |
n/a |
iOS |
n/a |
Wood Sculptor |
com.wood.sculptor.cutter (id1603211466) |
n/a |
iOS |
n/a |
Fire-Wall |
com.fire.wall.poptit (id1540542924) |
n/a |
iOS |
n/a |
Ninja Critical Hit |
wger.ninjacriticalhit.ios (id1514055403) |
n/a |
iOS |
n/a |
n/a |
com.TonyRuns.game (n/a) |
n/a |
Android |
a7fea60c806d2dd10482cd630834373e49b4d944aa19d47091b3bd0a9d7890be |
Super Hero-Save the world! |
com.asuper.man.playmilk |
1000000 |
Android |
f90565a625044883ec9ce6323e813420412cf5c11e5f48f111dec4e1664cd176 |
Arrow Coins |
com.arrow.coins.funny |
500000 |
Android |
94d10d5839343072aa41bdd61259b580e567e621818686559dffe888dd9337eb |
Parking Master |
com.ekfnv.docjfltc.parking.master |
500000 |
Android |
d43ee224e32e7d5d4ab901810afd7148cbf20ad57b07dc193cd154078ce433bb |
Lady Run |
com.lady.dress.run.sexylady |
100000 |
Android |
0fc35fba6a708d5c6ca7da13e294cab70530c63828d9e4dbadf430e5c8f65b4b |
Magic Brush 3D |
com.magic.brush.gamesly |
100000 |
Android |
0efc7c822685ebdf8f4d3d7d3104a957059c432b80624e3de6602c41bc95347f |
Shake Shake Sheep |
com.shake.earn.sheep.causalgame |
100000 |
Android |
f0693787bffcde05fe419518621f199765ee802e00be50102c380563db678e9b |
Number Combination: Colored Chips |
com.yigegame.jyfsmnq.gg |
100000 |
Android |
fe1d3f3c2ed8858c0327559f66149a4f0b82b01693b296e64448dfcff9d24ae0 |
Jackpot Scratcher-Win Real |
com.physicswingsstudio.JackpotScratchers |
5,000 |
Android |
973ffa44c550c25b9ef80e176bb64f170647fd5ee115a3d03b98c88cc9a70a16 |
Scratch Carnival |
com.scratchers.jackpot.luckypiggy |
50,000 |
Android |
355a9622553ddbe7bcc78a2a04ce2f5c6067ac07e8f31168e76b884c2403923f |
Ztime:Earn cash rewards easily |
com.pocky.ztime |
100000 |
Android |
4e94ab4fddde2f3f891777d21e4859aaa68dc9366aca82e15418692afb91af36 |
Billionaire Scratch |
com.free.tickets.scratchers.Billionaire |
50,000 |
Android |
438e097fa5796400141f6b88b430829c2e3eebda7531e2deec4cf81d0ca15404 |
Lucky Wings - Lotto Scratchers |
com.free.scratchers.luckywings |
100000 |
Android |
420822558735922aee5efd5da2c22ffade14597e3f1d11ebf11ab12f0b3791b7 |
Lucky Star: Lotto Scratch |
com.free.tickets.scratchers.LuckyLotto |
50,000 |
Android |
3b1210ec0bd143b3131a04ac23f7d00fa6c1639a4679f2ebd694132145ce65f2 |
Shake Shake Pig |
com.ldle.merge.free.coinspiggy |
100000 |
Android |
6ad0de5604b1f787908fc277780b4d45dbcbfcdd98304b1f4ecf61c12e0fcc95 |
Lucky Money Tree |
com.ldle.merge.lucky.moneytree |
100000 |
Android |
0a201d6da8e7a1b167bda949634d00d389dc995776bad398d0272c27cf85e710 |
Run And Dance |
com.tap.run.and.dance |
100000 |
Android |
539556f6ec50a7be633a1b5c3e30f01ba6520d6c28b1c6a57418636118e7677c |
Lucky Scratchers: Lotto Card |
com.lotto.bingo.lucky.scratchcard |
1000 |
Android |
54c76607362e52798ae7535e8f7ead83474ecb49944e4bfc3f29537eb2e4a40c |
Pull Worm |
com.pull.bugs.worm |
10000 |
Android |
ca0518bb9e77c498a222fdd0d99afc4b56eaa7ed2cf7953711d2a5872cf4e689 |
Crowd Battle:Fight the bad guys |
com.crowd.battle.goamy |
5000 |
Android |
ec47369e7557b695784ae4b7bb419cf6d2a4978b53d94f83b3ff50b0f24138db |
Shoot Dummy - Win Rewards & Paypal Cash |
com.shoot.dummy.fast.speed.linger |
10000 |
Android |
4e9fd0291f921711fb19dd21d941a324c72cb77a23a9111c631304d192cea1ca |
Spot 10 Differences |
com.different.ten.spotgames |
1000000 |
Android |
2a4934fdb93b410d838f9b70f1d9a0b6a144016a5670cbf3b5df070273ff671f |
Find 5 Differences - New |
com.find.five.subtle.differences.spot.new |
1000000 |
Android |
3d67493bfd6eeadffef1d31f0eda3cb2ce11876f5a6458456322d536a0c9e7ff |
Dinosaur Legend |
com.huluwagames.dinosaur.legend.play |
1000000 |
Android |
8089bd929512552664daf8f28bee643bb88fbf3ceadc60d0faa439072473f804 |
One Line Drawing |
com.one.line.drawing.stroke.yuxi |
1000000 |
Android |
27d7f05cc02bcfe7b1d5e746c5025b7bffe2534086ca4f0c04336c2d12891283 |
Shoot Master |
com.shooter.master.bullet.puzzle.huahong |
1000000 |
Android |
4d1ccfa348c6c20b0291ac3ec2dacca47ed89b14f9d4b8ccde683f368494dc9f |
Talent Trap - NEW |
com.talent.trap.stop.all |
1000000 |
Android |
b6399d21f7a72f1b0bbc73864c9c228c5a4b8f6331aa5133d56589439f9747e7 |
Shoot it: Using Gun |
com.bullet.shoot.fight.gtommm.tom |
500000 |
Android |
d6fc218b1ca0eff4e2ee65dcd2a2b173192d9c0617de5134a150bbf6972e195c |
Super Flake |
com.chop.slice.flake2020 |
500000 |
Android |
0695f9028b1a6038ece961b494971f6762b403952c37b7f95e66112d8fc8027b |
Five-Star Slice |
com.five.star.slice |
500000 |
Android |
1cea4435ead7d166e509f3cc9c9a556383822ca98ee3fdfd48c4c9d683f833d3 |
Sand Drawing |
com.sand.drawing.newfight |
500000 |
Android |
21c77771d23805593ff3f637245992376d7dce6fc18de4862973b94c184aa91c |
Mr Dinosaur: Play your Dino |
com.topggame.facego.finger.crazy.dino |
500000 |
Android |
abb3ae69fe1f6cf35b54508025c8a6734fe35ded22a6d42bcbcc65aa75bddb3b |
Track Sliding New |
com.track3d.sliding.new |
500000 |
Android |
08aeda329f3e0807625f228db30001ef83ff48fa82962bc50f84f8904a20dafb |
Beat Kicker New |
com.beat.kicker.two.game |
100000 |
Android |
d51080d79668b6d4036a7e5ece86389f7f12305b8ca2c379559b764455406180 |
Fill Color 3D |
com.cube.fill.color.paint.turn.fei |
100000 |
Android |
8d5f8dd171fff8dd838871a519ae243c5bb4beeaf904cd365b97a05506aefb8a |
Draw Live |
com.draw.live.milipop |
100000 |
Android |
7bc9e4ebf7ea018d87ac1fb47bdebe3dcf94dd02d0d8fefef902c22166d33493 |
Draw 1 Stroke |
com.draw.one.line.stroke.xipi |
100000 |
Android |
53739fa52192f8493da4a0067ec27c753a017941325f913508a8c8c840b534d9 |
Fidget Cubes |
com.fidget.cubes.feel.like |
100000 |
Android |
4cb13dbb442a0b2c657e5c79a60e856f86e18ee425896b996b9a6452519aca2c |
Girls Fight |
com.girls.fight.fly |
100000 |
Android |
ee99a02f917a083348984b29bbfec81ec545bc16d401b391c923db14d546e353 |
Ninja Assassin |
com.knifeninja.assassin.dltc |
100000 |
Android |
69aff645ee74bb7fa0ec4c142a7c5b07fda768742051a05d41ecb5ac456d5d28 |
Shooting Puzzle 2020 |
com.my.bullet.shooting.man.hunter.youxi |
100000 |
Android |
1a23244555d1dbd9ead7019ed07dc6af157e0321e24182c53329be5d734a49ca |
Pulley Parkour |
com.pul.parkour.bbroller |
100000 |
Android |
18ad35cadd4a4a15a40a85ef577645b0ff70199b11b25732e94b403f0063bf23 |
Chop Flake 3D |
com.slice.chop.superslice3d |
100000 |
Android |
e8d7baecb47b3a671c99cb0be21cb6b9e3ca4513cff6f02e51ac9d417d88b73b |
Weapon Fantasy |
com.weapon.fantasy.games |
100000 |
Android |
90857e546fc916b77b1c307ad5a8c19ab213bdadd201350d4c7e6a418bde489f |
Balloon Shooter |
com.balloon.shooter.play |
50000 |
Android |
62272f387631a5dc4b5561ad892170f94cb1ebf804a0c863929dae76084e9529 |
Musical Shoot |
com.ltcmusical.fun2021 |
50000 |
Android |
f0d976fd5061ca5e5a8982a7f7cfafe472f6570a7de7f752501260599034c744 |
Chop Slices |
com.lvdiao.chop.slices.chef |
50000 |
Android |
c5c51f40f5bf4e63795cffd5d2e21ee64c1a586c00249a84ad315b2c7ea30acc |
Ninja Slice |
com.slice.masked.games |
50000 |
Android |
c3db0ee64786b4aec5d61c3a993ab25fab2c04d2691ddfe4aae2e0fc87d4952f |
Work Now! |
com.work.now.slack |
50000 |
Android |
c4a7057b987ce0daf8e355e801b2ab9386a72eaa80d3592dadfd4c55e5997304 |
Bottle Jump |
com.bottle.jump.flip.challenge.fun |
10000 |
Android |
2b109f567bcd83ab6548add5bbad392f0e5b4e7d3eeedd1363c46bdcc95d8ed3 |
Corn Scraper |
com.corn.scraper.cut.pipe.siling |
10000 |
Android |
b9c94a1c06e671600fd4d9dbfc2a7852a3786d10394afbfb477f1b6df7c74952 |
Idle Wood Maker |
com.idle.wood.maker.gametwo |
10000 |
Android |
1a667ba74f9ec4b0d1d36408d8af1ff2493156960134178ff84f4a4d36837c15 |
Pop Girls Schooler |
com.pop.girls.schooler |
10000 |
Android |
2ce1c4dc30313facbdec12030cbd3a94dbc66dbfd2feab7bb231a3bb847b7a86 |
Romy Rush |
com.romy.rushrun |
10000 |
Android |
ccecf8310b7d300abe7ff808df4198ed4d0c9e734aaf8c95413d6a67abc4290c |
Spear Hero |
com.spear.super.man.hero |
10000 |
Android |
33472b314c5beb8a0927522e9adf74e38b92ec5638f10d58457072177b926fb1 |
Dig Road Balls |
com.dig.road.balls.play.games.ygygame |
5000 |
Android |
97ed09697b85cf1d58aebc4d8f306c19beff1b949b80682c414f33d902521778 |
BOO Popstar |
com.boostar.boo.popstar |
1000 |
Android |
6687bdee0ecfec779f660327832d17739d95a4dd06536bbb387bd1175d5eb65c |
Draw CompleteA |
com.darwa.completea.ltca |
1000 |
Android |
2f949069c0951b7d8203d17d401e0ad5b42e7bb3c0b8c56b4ac5383c3a21c336 |
Rush 2048:3D Shoot Cubes |
com.rushcube.puzzle.block |
100 |
Android |
6c00ad91e11ded8b006372d95ab40f0d0769a2fbaaf21909b42bfad147fe74df |
Meet Camera |
com.magicvcam.hdmeet.cam008 |
0 |
Android |
f7f55f024a5c3e5b18cde924ce25f72aab4523a148c24f0d9eea5d2581caa470 |
Auto Stamp Camera |
com.stac.amper.qweaf |
100+ |
Android |
028dfbf91b3b54425ddb6445e2ec3ed01e1f5f736c6821447b67816148a3f6fe |
n/a |
com.find.five.differences.lvye.xsl |
|
Android |
d45b38198005b9de44994347e9d40ad822abaa969c3a53ec63cc31adcfb9772d |
n/a |
com.mufc.zwxfb |
|
Android |
67971ff706a897fdca3487bc5782a3813a3d3d2b4261524cc214f1f5b6ffdf27 |
Roll Turn |
com.roll.turn.song.wusi.pt |
1m+ |
Android |
572cc347cbcdbcf0f09470d22215f6791512ca0e74434e357c967e7515d9c2f8 |
Hiding Draw |
com.hiding.drawltc.games |
5k+ |
Android |
fe8761e1be482bcea96d0edad74af19c6ce6ad85fe88178ff8343f0df61a1ccc |
Peter Shoot |
com.ltc.peter.shoot.tslgame |
100k+ |
Android |
e0c1774a83eda1420d5798a231592afdb8844ae7c0a2614142290d384327df63 |
Design n Road |
com.ltcdesign.nroad |
1k+ |
Android |
5773e83f37ba16600f3e71bc5956d56be3a6c013e95f1c216bbf41eb8acf9be5 |
Draw Complete |
com.ltcdraw.complete.fly |
10k+ |
Android |
0f1216681cca2781e73b50fbeb96bbe55a483aef79f2f5109e5776067a645fa4 |
Thief King |
com.ltcking.thief.game.tsl |
100k+ |
Android |
96c35c5887b4a11a11590e9bba39771098ad83946eb0387cc52391b808191aaa |
Downhill Race |
com.downhill.race.redbull |
5k+ |
Android |
3c82a1c3fa04bbd4cb8b77f1ee5fe905b4a94d2e63f80a5ae19ecd71e9d0e920 |
Draw a War |
com.draw.war.army |
10k+ |
Android |
b18072fb8f54e020e028cdd10fb5304ab55328c90c599fc2528d3e2b2713ccf8 |
Rescue Master |
com.rescue.master.gear.mechanics.wushi |
1k+ |
Android |
e16dbfa2f712f8ccf36c07c5015142e0d63db0aec12d6efe656ce83ae285b8da |
Spin:Letter Roll |
come.letter.roll.race |
100k+ |
Android |
a65f2902fd3c067432804fd03b2c24de85af88a1f22596a1a3da65eb26cb716d |
Helicopter Attack - NEW |
com.helicopter.attack.shoot.sanba |
500k+ |
Android |
d40968b523ee99a78d752711e677bafa5a872f17d963640a4fac9418cca50ceb |
Crush Car |
com.crush.car.fly.delivery.lingjiu |
1m+ |
Android |
577f0644f9cd0849e51a6f5c0dadd7bafcc11b29b6353d97ffa039f3835747a6 |
Relx cash |
com.tycmrelx.cash |
100k+ |
Android |
ec41dce767a5f49bbe1191f127f2f2c5a6a6345650b51a53795e273504062674 |
War in Painting |
com.painting.war.inpaper |
100+ |
Android |
17aa73a2c3967efd6b11b8c59cf51fcab839169b2281c7f435b2cca5e8ab1ab5 |
Bike Extreme Racing |
com.bike.extreme.raceing.bikegames |
50k+ |
Android |
576e5381142a2fe7fa8279d2a8d7fd4123adb7ae885029dca1bc5050ada2da0b |
Player Spiral Maker 3D |
com.player.spiral.maker.d3 |
50k+ |
Android |
6d6a8f797415a26f51e1a5ba1de7c75cddd3b5a5a5c5148590355bf62f84b0be |
Match 3 Tiles |
com.blocks.tile.matching |
10k+ |
Android |
f9932711ca68d431824fa1557a333176e97faf529b1edde6bd7c0e8e2b614114 |
2048 Merge Cube - Win Cash |
com.cube.merge.shooter |
10k+ |
Charybdis:
App Name |
App ID |
Installs reported by Google’s Play Store |
[unknown] |
com.car.jumpygy.race |
0 |
[unknown] |
com.droiand.killer.assassin.fun |
0 |
[unknown] |
com.ocean.fire.uabfire |
0 |
[unknown] |
com.pips.connect.uabking |
0 |
[unknown] |
com.recharge.go.run |
0 |
[unknown] |
com.Sign.Maker.cut.paint |
0 |
Lucky Now! Scratch, Spin, Play Lottery & Win Money |
com.lucky.scratch.spin.us |
1,000,000 |
Lark - Work, Together |
com.larksuite.suite |
500,000 |
Assassin Legend - 2020 NEW |
com.assassin.knife.legend.wuheng |
100,000 |
Find the Differences - Puzzle Game |
com.find.five.differences.picture.houpu |
100,000 |
Wood Carving - NEW |
com.wood.carving.cut.erqi |
50,000 |
Idle Edo: Simulation of City Builder, Tycoon Games |
com.edotime.picturescroll |
1,000 |
Fresh Camera |
com.cam.air.crush |
1,000,000 |
Crush Car |
com.crush.car.fly.delivery.lingjiu |
1,000,000 |
Draw Color By Number |
com.draw.color.number.paint.lvye |
1,000,000 |
Happy Color By Number - New |
com.happy.color.number.paint.hang.new |
1,000,000 |
Stack Block Crusher |
com.ygygame.stack.block.crusher |
1,000,000 |
Disc Sport |
com.disc.sports.battle.fly.yewai |
500,000 |
Fire In The Desert |
com.fire.the.desert.in |
500,000 |
Running Dinosaur |
com.games.mili.running.dinosaur.funny |
500,000 |
Helicopter Attack - NEW |
com.helicopter.attack.shoot.sanba |
500,000 |
Help Me Down Game |
com.help.me.game.puzzle.waocmangames |
500,000 |
Rolling Scroll |
com.rollscroll.rollingsc |
500,000 |
Rugby Pass |
com.rugby.pass.listgame |
500,000 |
Color By Number |
com.color.number.book.art.sanba |
100,000 |
Find Hidden |
com.find.hidden.objects.ltcltc |
100,000 |
Flying Skateboard |
com.flying.skate.rolling |
100,000 |
Iron It |
com.iron.clothes.smooth.perfect |
100,000 |
Jump Jump |
com.jump.ltcjump.game |
100,000 |
Love Saver |
com.make.love.saver.pop |
100,000 |
Plant Monster |
com.plant.eat.grow.monster.wuba |
100,000 |
Sway Man |
com.sway.man.escape.tumbler |
100,000 |
Peter Shoot |
com.ltc.peter.shoot.tslgame |
50,000 |
Shooting Run |
com.shoot.ing.rungame.ltcpp |
50,000 |
Circuit Master |
com.cir.cuit.master.likeapp |
10,000 |
Desert Against |
com.desert.against.ygygy.game |
10,000 |
Balls Out Pazzle: Puzzle Maze Game |
com.games.balls.out.puzzle.funny |
10,000 |
Stacking Jump - Make Human Ladders |
com.ladder.tower.stacking.jump.wuxiang |
10,000 |
Musical Shoot |
com.musicalltc.shoot.game |
10,000 |
Bungee Jumper |
com.bungee.jumper.gamelite |
5,000 |
Rugby Master |
com.master.rugby.discogame |
5,000 |
หวยสามารถเบ็ต SamartBet ยี่กี เกมส์ บาคา กีฬา |
com.orghonoka.misamart |
5,000 |
Magic and Throne |
com.ylyy.magicandthrone |
5,000 |
Draw & Puzzle |
com.brain.guess.draw.puzzle.something |
1,000 |
Color the Pictures |
com.color.pictures.paint.number.yiliu |
1,000 |
Crush King |
com.crush.king.jump.truck.siliu |
1,000 |
Happy Mouse! |
com.happy.mice |
1,000 |
King of Thieves |
com.king.of.thief.easier |
1,000 |
Magic Brain |
com.magic.brain.think.solvelogic |
1,000 |
Props Rescue |
com.props.rescue.girl |
1,000 |
Find All |
com.find.all.out.different |
1 |
House Maker |
com.bet.house.maker |
0 |
Helicopter Attack |
com.helicopter.attack.gun.rescue.liuliu |
0 |
Poseidon:
com.magicvcam.beauty.yoobao.camera
com.onestoke.games.www.puzzlegame
com.time.date.stamp.camera.xixifunction
art.eff.filter.photo.editor
com.jelly.crush.europam.games
com.tools.blur.master.editor
com.mirth.cam.pic
com.mobwontools.pixel.blur.editor
com.blurcam.pro.usefultools
com.magicvcam.tool.beauty.camera
com.mobwontools.pixel.blur.cam
com.camera999.super.photo.editor
com.jelly.bubble.game.pop
com.pic.photo.editor.eraser
com.music.play.hi.cloud
com.puzzle.ygyline.onestroke
com.puzzle.lines1.drawstroke
com.video.nin.cut.face
com.camera.ygysuper.photograph
com.magicvcam.hdmeet.cam008
com.box.checkers.chess.free
com.super.photo.ygy.camera
com.magicvcam.meet.photograph
com.funny.camera.top
com.soon.ygy.photograph.camera
com.video.master.face.fb
com.magicvcam.camera.meet
com.camera.easy.photo.beauty
com.magicvcam.camera.newmeet
com.magicvcam.ygycronus.camera.magic
com.cos.ygy.camera.new
com.jelly.cube.crush.colors
com.photoeditor.background.change
com.connect.dots.maker.drawonelin
com.blur.oceans.flyin
com.magicvcam.mine.ygycamera.magic
com.ygy.find.spot.the.difference
com.candy.crushfunny.toystoys
com.frog.crushtoy.blast
com.magicvcam.ygycamera.magic.tool
com.toy.blast.cube.crush.toysfun
com.magicvcam.photos.ygy.tool.magic