Skip to main content

Chinese Adult Content Scam Targets Mobile Users Through PWA Injection

Medium
Published: Thu May 22 2025 (05/22/2025, 13:09:10 UTC)
Source: AlienVault OTX General

Description

A new injection campaign has been identified that exploits third-party JavaScript to redirect mobile users to a Chinese adult-content Progressive Web App (PWA) scam. The attack specifically targets mobile devices, injecting a viewport meta tag and an ad overlay with click-hijacking functionality. The scam utilizes PWAs to increase user retention and bypass basic browser protections. The compromised websites are disguised as novel reading platforms, with the malicious code now being encrypted. The attack flow involves an initial loader script, which triggers the redirect on mobile devices while ignoring desktop visits. The payload script ensures mobile rendering, creates an overlay with deceptive elements, and opens the scam site in a new tab upon interaction.

AI-Powered Analysis

AILast updated: 06/22/2025, 03:51:02 UTC

Technical Analysis

This security threat involves a targeted injection campaign that exploits third-party JavaScript on compromised websites to redirect mobile users to a Chinese adult-content scam delivered via Progressive Web Apps (PWAs). The attack specifically targets mobile devices by injecting a viewport meta tag and an ad overlay designed with click-hijacking capabilities. The malicious code is encrypted to evade detection and is embedded within websites masquerading as novel reading platforms, increasing the likelihood of user interaction. The attack flow begins with an initial loader script that activates only on mobile devices, ignoring desktop visits to avoid detection and maximize impact on mobile users. Once triggered, the payload script ensures the malicious content is rendered appropriately on mobile screens, creates a deceptive overlay with interactive elements, and upon user interaction, opens the scam PWA in a new browser tab. This approach leverages the PWA technology to increase user retention and bypass basic browser security protections, making it harder for users and automated defenses to block or detect the scam. The campaign uses techniques aligned with MITRE ATT&CK tactics such as user execution (T1204.001), phishing (T1606.002), and web service exploitation (T1608.004), combined with click-jacking (T1185) and UI redressing (T1189). Although no direct exploits or vulnerabilities in software versions are identified, the threat relies on compromising third-party JavaScript dependencies or supply chain elements to inject malicious code. The campaign is ongoing as of May 2025 and is notable for its focus on mobile platforms and use of encrypted payloads to evade detection.

Potential Impact

For European organizations, this threat primarily impacts mobile users accessing compromised websites, particularly those related to digital reading or content platforms. The scam can lead to user deception, potential financial fraud, privacy violations, and reputational damage if users associate the organization with malicious activity. The use of PWAs allows the scam to persist on user devices, potentially leading to repeated fraudulent interactions or data harvesting. While the direct impact on enterprise infrastructure is limited, organizations with mobile user bases or those hosting third-party JavaScript dependencies are at risk of indirect exposure. This can result in increased support costs, loss of user trust, and potential regulatory scrutiny under GDPR if personal data is mishandled or if the scam leads to unauthorized data collection. Additionally, the campaign's evasion techniques complicate detection and mitigation, increasing the risk of prolonged exposure. The threat also highlights supply chain risks, as compromised third-party scripts can affect multiple organizations simultaneously. Given the focus on mobile devices, sectors with high mobile engagement such as media, publishing, and e-commerce in Europe are particularly vulnerable.

Mitigation Recommendations

To mitigate this threat, European organizations should implement the following specific measures: 1) Conduct thorough audits of all third-party JavaScript dependencies and supply chain components to identify and remove or update any compromised scripts. 2) Employ Content Security Policy (CSP) headers with strict directives to restrict the loading of unauthorized scripts and prevent injection attacks. 3) Implement Subresource Integrity (SRI) checks on all third-party scripts to ensure their integrity and detect tampering. 4) Monitor mobile traffic patterns for unusual redirects or overlay behaviors indicative of click-hijacking or PWA injection. 5) Educate mobile users about the risks of interacting with unexpected overlays or redirects, emphasizing caution with novel reading platforms or unfamiliar PWAs. 6) Use mobile endpoint protection solutions capable of detecting malicious PWAs and overlay injections. 7) Collaborate with web hosting and CDN providers to ensure rapid response and remediation of compromised sites. 8) Regularly update and patch web application frameworks and libraries to reduce the attack surface. 9) Employ runtime application self-protection (RASP) technologies to detect and block injection attempts in real time. 10) Establish incident response procedures specifically addressing mobile-targeted web injection scams to minimize impact and recovery time.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://cside.dev/blog/chinese-adult-content-scam-targets-mobile-users-through-pwa-injection"]
Adversary
Pulse Id
682f21f6cc65ef99f4b1d343

Indicators of Compromise

Url

ValueDescriptionCopy
urlhttps://www.akav50.top/list/1dpy76pv
urlhttps://www.akav50.top/list/32xdq1pd
urlhttps://www.akav50.top/list/92qlr9pn
urlhttps://www.akav50.top/list/l50dx72e
urlhttps://www.akav50.top/list/mqp10w2x
urlhttps://www.akav50.top/list/oq5dd058
urlhttps://www.akav50.top/list/q5o9gx5w
urlhttps://www.akav50.top/list/r42r7opq
urlhttps://www.akav50.top/list/yn2k0ypd
urlhttps://www.akav50.top/list/z32x7npd
urlhttps://xjdm166.com/html/#/i/home
urlhttps://xjdm166.com/html/?p=1388
urlhttps://xxsmad6.com
urlhttps://xxsmad6.com/s.php?g=1&t=2&p=1388&i=
urlhttps://xxsmad6.com/static/union/images/b-5.png'
urlhttps://xxsmad6.com/static/union/images/close.png'

Domain

ValueDescriptionCopy
domainxjdm166.com
domainakav01.top-akav60.top
domainwww.akav50.top

Threat ID: 682f3a100acd01a2492611e3

Added to database: 5/22/2025, 2:52:00 PM

Last enriched: 6/22/2025, 3:51:02 AM

Last updated: 8/4/2025, 3:13:32 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats