Chinese Adult Content Scam Targets Mobile Users Through PWA Injection
A new injection campaign has been identified that exploits third-party JavaScript to redirect mobile users to a Chinese adult-content Progressive Web App (PWA) scam. The attack specifically targets mobile devices, injecting a viewport meta tag and an ad overlay with click-hijacking functionality. The scam utilizes PWAs to increase user retention and bypass basic browser protections. The compromised websites are disguised as novel reading platforms, with the malicious code now being encrypted. The attack flow involves an initial loader script, which triggers the redirect on mobile devices while ignoring desktop visits. The payload script ensures mobile rendering, creates an overlay with deceptive elements, and opens the scam site in a new tab upon interaction.
AI Analysis
Technical Summary
This security threat involves a targeted injection campaign that exploits third-party JavaScript on compromised websites to redirect mobile users to a Chinese adult-content scam delivered via Progressive Web Apps (PWAs). The attack specifically targets mobile devices by injecting a viewport meta tag and an ad overlay designed with click-hijacking capabilities. The malicious code is encrypted to evade detection and is embedded within websites masquerading as novel reading platforms, increasing the likelihood of user interaction. The attack flow begins with an initial loader script that activates only on mobile devices, ignoring desktop visits to avoid detection and maximize impact on mobile users. Once triggered, the payload script ensures the malicious content is rendered appropriately on mobile screens, creates a deceptive overlay with interactive elements, and upon user interaction, opens the scam PWA in a new browser tab. This approach leverages the PWA technology to increase user retention and bypass basic browser security protections, making it harder for users and automated defenses to block or detect the scam. The campaign uses techniques aligned with MITRE ATT&CK tactics such as user execution (T1204.001), phishing (T1606.002), and web service exploitation (T1608.004), combined with click-jacking (T1185) and UI redressing (T1189). Although no direct exploits or vulnerabilities in software versions are identified, the threat relies on compromising third-party JavaScript dependencies or supply chain elements to inject malicious code. The campaign is ongoing as of May 2025 and is notable for its focus on mobile platforms and use of encrypted payloads to evade detection.
Potential Impact
For European organizations, this threat primarily impacts mobile users accessing compromised websites, particularly those related to digital reading or content platforms. The scam can lead to user deception, potential financial fraud, privacy violations, and reputational damage if users associate the organization with malicious activity. The use of PWAs allows the scam to persist on user devices, potentially leading to repeated fraudulent interactions or data harvesting. While the direct impact on enterprise infrastructure is limited, organizations with mobile user bases or those hosting third-party JavaScript dependencies are at risk of indirect exposure. This can result in increased support costs, loss of user trust, and potential regulatory scrutiny under GDPR if personal data is mishandled or if the scam leads to unauthorized data collection. Additionally, the campaign's evasion techniques complicate detection and mitigation, increasing the risk of prolonged exposure. The threat also highlights supply chain risks, as compromised third-party scripts can affect multiple organizations simultaneously. Given the focus on mobile devices, sectors with high mobile engagement such as media, publishing, and e-commerce in Europe are particularly vulnerable.
Mitigation Recommendations
To mitigate this threat, European organizations should implement the following specific measures: 1) Conduct thorough audits of all third-party JavaScript dependencies and supply chain components to identify and remove or update any compromised scripts. 2) Employ Content Security Policy (CSP) headers with strict directives to restrict the loading of unauthorized scripts and prevent injection attacks. 3) Implement Subresource Integrity (SRI) checks on all third-party scripts to ensure their integrity and detect tampering. 4) Monitor mobile traffic patterns for unusual redirects or overlay behaviors indicative of click-hijacking or PWA injection. 5) Educate mobile users about the risks of interacting with unexpected overlays or redirects, emphasizing caution with novel reading platforms or unfamiliar PWAs. 6) Use mobile endpoint protection solutions capable of detecting malicious PWAs and overlay injections. 7) Collaborate with web hosting and CDN providers to ensure rapid response and remediation of compromised sites. 8) Regularly update and patch web application frameworks and libraries to reduce the attack surface. 9) Employ runtime application self-protection (RASP) technologies to detect and block injection attempts in real time. 10) Establish incident response procedures specifically addressing mobile-targeted web injection scams to minimize impact and recovery time.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
Indicators of Compromise
- url: https://www.akav50.top/list/1dpy76pv
- url: https://www.akav50.top/list/32xdq1pd
- url: https://www.akav50.top/list/92qlr9pn
- url: https://www.akav50.top/list/l50dx72e
- url: https://www.akav50.top/list/mqp10w2x
- url: https://www.akav50.top/list/oq5dd058
- url: https://www.akav50.top/list/q5o9gx5w
- url: https://www.akav50.top/list/r42r7opq
- url: https://www.akav50.top/list/yn2k0ypd
- url: https://www.akav50.top/list/z32x7npd
- url: https://xjdm166.com/html/#/i/home
- url: https://xjdm166.com/html/?p=1388
- url: https://xxsmad6.com
- url: https://xxsmad6.com/s.php?g=1&t=2&p=1388&i=
- url: https://xxsmad6.com/static/union/images/b-5.png'
- url: https://xxsmad6.com/static/union/images/close.png'
- domain: xjdm166.com
- domain: akav01.top-akav60.top
- domain: www.akav50.top
Chinese Adult Content Scam Targets Mobile Users Through PWA Injection
Description
A new injection campaign has been identified that exploits third-party JavaScript to redirect mobile users to a Chinese adult-content Progressive Web App (PWA) scam. The attack specifically targets mobile devices, injecting a viewport meta tag and an ad overlay with click-hijacking functionality. The scam utilizes PWAs to increase user retention and bypass basic browser protections. The compromised websites are disguised as novel reading platforms, with the malicious code now being encrypted. The attack flow involves an initial loader script, which triggers the redirect on mobile devices while ignoring desktop visits. The payload script ensures mobile rendering, creates an overlay with deceptive elements, and opens the scam site in a new tab upon interaction.
AI-Powered Analysis
Technical Analysis
This security threat involves a targeted injection campaign that exploits third-party JavaScript on compromised websites to redirect mobile users to a Chinese adult-content scam delivered via Progressive Web Apps (PWAs). The attack specifically targets mobile devices by injecting a viewport meta tag and an ad overlay designed with click-hijacking capabilities. The malicious code is encrypted to evade detection and is embedded within websites masquerading as novel reading platforms, increasing the likelihood of user interaction. The attack flow begins with an initial loader script that activates only on mobile devices, ignoring desktop visits to avoid detection and maximize impact on mobile users. Once triggered, the payload script ensures the malicious content is rendered appropriately on mobile screens, creates a deceptive overlay with interactive elements, and upon user interaction, opens the scam PWA in a new browser tab. This approach leverages the PWA technology to increase user retention and bypass basic browser security protections, making it harder for users and automated defenses to block or detect the scam. The campaign uses techniques aligned with MITRE ATT&CK tactics such as user execution (T1204.001), phishing (T1606.002), and web service exploitation (T1608.004), combined with click-jacking (T1185) and UI redressing (T1189). Although no direct exploits or vulnerabilities in software versions are identified, the threat relies on compromising third-party JavaScript dependencies or supply chain elements to inject malicious code. The campaign is ongoing as of May 2025 and is notable for its focus on mobile platforms and use of encrypted payloads to evade detection.
Potential Impact
For European organizations, this threat primarily impacts mobile users accessing compromised websites, particularly those related to digital reading or content platforms. The scam can lead to user deception, potential financial fraud, privacy violations, and reputational damage if users associate the organization with malicious activity. The use of PWAs allows the scam to persist on user devices, potentially leading to repeated fraudulent interactions or data harvesting. While the direct impact on enterprise infrastructure is limited, organizations with mobile user bases or those hosting third-party JavaScript dependencies are at risk of indirect exposure. This can result in increased support costs, loss of user trust, and potential regulatory scrutiny under GDPR if personal data is mishandled or if the scam leads to unauthorized data collection. Additionally, the campaign's evasion techniques complicate detection and mitigation, increasing the risk of prolonged exposure. The threat also highlights supply chain risks, as compromised third-party scripts can affect multiple organizations simultaneously. Given the focus on mobile devices, sectors with high mobile engagement such as media, publishing, and e-commerce in Europe are particularly vulnerable.
Mitigation Recommendations
To mitigate this threat, European organizations should implement the following specific measures: 1) Conduct thorough audits of all third-party JavaScript dependencies and supply chain components to identify and remove or update any compromised scripts. 2) Employ Content Security Policy (CSP) headers with strict directives to restrict the loading of unauthorized scripts and prevent injection attacks. 3) Implement Subresource Integrity (SRI) checks on all third-party scripts to ensure their integrity and detect tampering. 4) Monitor mobile traffic patterns for unusual redirects or overlay behaviors indicative of click-hijacking or PWA injection. 5) Educate mobile users about the risks of interacting with unexpected overlays or redirects, emphasizing caution with novel reading platforms or unfamiliar PWAs. 6) Use mobile endpoint protection solutions capable of detecting malicious PWAs and overlay injections. 7) Collaborate with web hosting and CDN providers to ensure rapid response and remediation of compromised sites. 8) Regularly update and patch web application frameworks and libraries to reduce the attack surface. 9) Employ runtime application self-protection (RASP) technologies to detect and block injection attempts in real time. 10) Establish incident response procedures specifically addressing mobile-targeted web injection scams to minimize impact and recovery time.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://cside.dev/blog/chinese-adult-content-scam-targets-mobile-users-through-pwa-injection"]
- Adversary
- Pulse Id
- 682f21f6cc65ef99f4b1d343
Indicators of Compromise
Url
Value | Description | Copy |
---|---|---|
urlhttps://www.akav50.top/list/1dpy76pv | — | |
urlhttps://www.akav50.top/list/32xdq1pd | — | |
urlhttps://www.akav50.top/list/92qlr9pn | — | |
urlhttps://www.akav50.top/list/l50dx72e | — | |
urlhttps://www.akav50.top/list/mqp10w2x | — | |
urlhttps://www.akav50.top/list/oq5dd058 | — | |
urlhttps://www.akav50.top/list/q5o9gx5w | — | |
urlhttps://www.akav50.top/list/r42r7opq | — | |
urlhttps://www.akav50.top/list/yn2k0ypd | — | |
urlhttps://www.akav50.top/list/z32x7npd | — | |
urlhttps://xjdm166.com/html/#/i/home | — | |
urlhttps://xjdm166.com/html/?p=1388 | — | |
urlhttps://xxsmad6.com | — | |
urlhttps://xxsmad6.com/s.php?g=1&t=2&p=1388&i= | — | |
urlhttps://xxsmad6.com/static/union/images/b-5.png' | — | |
urlhttps://xxsmad6.com/static/union/images/close.png' | — |
Domain
Value | Description | Copy |
---|---|---|
domainxjdm166.com | — | |
domainakav01.top-akav60.top | — | |
domainwww.akav50.top | — |
Threat ID: 682f3a100acd01a2492611e3
Added to database: 5/22/2025, 2:52:00 PM
Last enriched: 6/22/2025, 3:51:02 AM
Last updated: 8/4/2025, 3:13:32 PM
Views: 15
Related Threats
EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
MediumThe Hidden Infrastructure Behind VexTrio's TDS
MediumMalicious JavaScript Injects Fullscreen Iframe On a WordPress Website
MediumCoordinated Brute Force Campaign Targets Fortinet SSL VPN
MediumHow "helpful" AI assistants are accidentally destroying production systems - and what we're doing about it.
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.