{"id":42383,"date":"2021-08-18T00:00:00","date_gmt":"2021-08-18T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-.html"},"modified":"2021-08-18T00:00:00","modified_gmt":"2021-08-18T00:00:00","slug":"fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/","title":{"rendered":"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_641.jpeg\"><!-- Begin mPulse library --><!-- END mPulse library --> <head> <meta charset=\"UTF-8\"> <meta name=\"viewport\" content=\"width=device-width\"> <meta name=\"description\"> <meta name=\"robots\" content=\"index,follow\"> <meta name=\"keywords\" content=\"research,mobile,articles, news, reports,cyber threats\"> <meta http-equiv=\"X-UA-Compatible\" content=\"IE=edge,chrome=1\"> <meta name=\"template\" content=\"article1withouthero\"> <meta property=\"article:published_time\" content=\"2021-08-18\"> <meta property=\"article:tag\"> <meta property=\"article:section\" content=\"research\"> <link rel=\"icon\" type=\"image\/ico\" href=\"\/content\/dam\/trendmicro\/favicon.ico\"> <link rel=\"canonical\" href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-.html\"> <title>Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads Paying for Subscription Service <\/title> <link href=\"https:\/\/fonts.googleapis.com\/css?family=Open+Sans:300,300i,400,400i,600\" rel=\"stylesheet\">\n<link href=\"\/\/customer.cludo.com\/css\/296\/1798\/cludo-search.min.css\" type=\"text\/css\" rel=\"stylesheet\"> <link rel=\"stylesheet\" href=\"\/etc.clientlibs\/trendresearch\/clientlibs\/clientlib-trendresearch.min.css\" type=\"text\/css\"> <meta property=\"og:url\" content=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-.html\"><br \/>\n<meta property=\"og:title\" content=\"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads Paying for Subscription Service \"><br \/>\n<meta property=\"og:site_name\" content=\"Trend Micro\"><br \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_641.jpeg\"><br \/>\n<meta property=\"og:locale\" content=\"en_US\"> <meta name=\"twitter:card\" content=\"summary_large_image\"><br \/>\n<meta name=\"twitter:site\" content=\"@TrendMicro\"><br \/>\n<meta name=\"twitter:title\" content=\"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads Paying for Subscription Service \"><br \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_641.jpeg\"> <\/head> <body class=\"articlepage page basicpage context-business\" id=\"readabilityBody\" readability=\"49.959545099401\"> <!-- Page Scroll: Back to Top --> <a id=\"page-scroll\" title=\"VerticalPageScroll\" href=\"javascript:jumpScroll($(this).scrollTop());\"> <span class=\"icon-chevron-up\"><\/span> <\/a> <!-- \/* Data Layer *\/ --> <\/p>\n<div class=\"root responsivegrid\">\n<div class=\"aem-Grid aem-Grid--12 aem-Grid--default--12 \">\n<div class=\"articleBodyNoHero aem-GridColumn aem-GridColumn--default--12\">\n<div class=\"research-layout article container\" role=\"contentinfo\">\n<article class=\"research-layout--wrapper row\" data-article-pageid=\"39706258\">\n<div class=\"col-xs-12 col-md-12 one-column\">\n<div class=\"col-xs-12 col-md-12\" readability=\"7.8054054054054\">\n<div class=\"article-details\" role=\"heading\" readability=\"35.124324324324\"> <span class=\"article-details__bar\" role=\"img\"><\/span> <\/p>\n<p class=\"article-details__description\">We recently discovered eight deceptive mobile apps that masquerade as cryptocurrency cloud mining applications where users can earn cryptocurrency by investing money into a cloud-mining operation. <\/p>\n<p class=\"article-details__author-by\">By: Cifer Fang <time class=\"article-details__date\">August 18, 2021<\/time> <span>Read time:&nbsp;<\/span><span class=\"eta\"><\/span> (<span class=\"words\"><\/span> words) <\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<hr class=\"research-layout-divider\"> <main class=\"main--content col-xs-12 col-md-8 col-md-push-2\"> <\/p>\n<div class=\"richText\" readability=\"40.313497340426\">\n<div readability=\"27.199468085106\">\n<p>Due to an increased number of people who are interested in learning about mining <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/definition\/cryptocurrency\">cryptocurrency<\/a>, cybercriminals are actively exploiting people\u2019s interest not just by deploying <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/defending-systems-against-cryptocurrency-miner-malware\">cryptocurrency-mining malware<\/a>, but by creating fake Android apps that target those interested in virtual coins.<\/p>\n<p>We recently discovered eight deceptive mobile apps that masquerade as cryptocurrency cloud mining applications (detected by Trend Micro as AndroidOS_FakeMinerPay and AndroidOS_FakeMinerAd), where users can earn cryptocurrency by investing money into a cloud-mining operation. However, upon analysis, we discovered that these malicious apps only trick victims into watching ads, paying for subscription services that have an average monthly fee of US$15, and paying for increased mining capabilities without getting anything in return. We have reported our findings to Google Play, and the apps have been promptly removed from the Play Store.<\/p>\n<p>These are the fraudulent apps that are now no longer available on the Play Store:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">BitFunds \u2013 Crypto Cloud Mining<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Bitcoin Miner \u2013 Cloud Mining<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Bitcoin (BTC) \u2013 Pool Mining Cloud Wallet<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Crypto Holic \u2013 Bitcoin Cloud Mining<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Daily Bitcoin Rewards \u2013 Cloud Based Mining System<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Bitcoin 2021<\/span><\/li>\n<li><span class=\"rte-red-bullet\">MineBit Pro &#8211; Crypto Cloud Mining &amp; btc miner<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Ethereum (ETH) &#8211; Pool Mining Cloud<\/span><\/li>\n<\/ul>\n<p>Two of these are even paid apps that users need to purchase; Crypto Holic \u2013 Bitcoin Cloud Mining costs US$12.99 to download, while Daily Bitcoin Rewards \u2013 Cloud Based Mining System costs US$5.99.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_1a.png\" alt=\"Screenshots of some of the fake cryptocurrency apps when they were still available on the Play Store\"> <\/figure>\n<\/p><\/div>\n<div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_1b.png\" alt=\"Screenshots of some of the fake cryptocurrency apps when they were still available on the Play Store\"> <\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_1c.png\" alt=\"Screenshots of some of the fake cryptocurrency apps when they were still available on the Play Store\"> <\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_1d.png\" alt=\"Screenshots of some of the fake cryptocurrency apps when they were still available on the Play Store\"> <\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_1e.png\" alt=\"Screenshots of some of the fake cryptocurrency apps when they were still available on the Play Store\"><figcaption>Figure 1. Screenshots of some of the fake cryptocurrency apps when they were still available on the Play Store<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"34.691887675507\">\n<div readability=\"18.502340093604\">\n<p>It\u2019s important to note that upon searching the keywords \u201ccloud mining\u201d on Google Play, we still found numerous concerning applications of the same type. Some of these apps have even been downloaded more than 100,000 times.<\/p>\n<p>Based on <a href=\"https:\/\/mars.trendmicro.com\/\">Trend Micro Mobile App Reputation Service (MARS)<\/a> data, more than 120 fake cryptocurrency mining apps are still available online. These apps, which do not have cryptocurrency mining capabilities and deceive users into watching in-app ads, have affected more than 4,500 users globally from July 2020 to July 2021. MARS also detects all of these samples as AndroidOS_FakeMinerPay and AndroidOS_FakeMinerAd.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_2.png\" alt=\"A screenshot that shows the number of installations BitFunds \u2013 Crypto Cloud Mining has gotten before it was taken down from the Play Store\"><figcaption>Figure 2. A screenshot that shows the number of installations BitFunds \u2013 Crypto Cloud Mining has gotten before it was taken down from the Play Store<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"33\">\n<div readability=\"11\">\n<h2><span class=\"body-subhead-title\">Technical analysis<\/span><\/h2>\n<p><b>Apps with no real cryptomining capability<\/b><\/p>\n<p>Our analysis of the abovementioned apps confirmed that they did not have any cryptocurrency-mining behavior. The fake mining activity on the apps\u2019 user interface (UI) is carried out via a local mining simulation module that includes a counter and some random functions.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_3a.png\" alt=\"The fake cryptomining apps simulate mining locally using a counter and random functions\"> <\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_3b.png\" alt=\"The fake cryptomining apps simulate mining locally using a counter and random functions\"><figcaption>Figure 3. The fake cryptomining apps simulate mining locally using a counter and random functions<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.5\">\n<div readability=\"16\">\n<p>Despite these apps not being associated with cloud-mining operations or having any cryptocurrency-mining features, some of these apps prompt users to pay for increased cryptocurrency-mining capabilities via the apps\u2019 in-app billing systems that range from US$14.99 to as high as $189.99. The app called Daily Bitcoin Rewards \u2013 Cloud Based Mining System prompts its users to upgrade their cryptomining capacity by \u201cbuying\u201d their favorite mining machines to earn more coins at a faster rate.<\/p>\n<p><b>Deception at its finest: Game posing as a cryptomining app<\/b><\/p>\n<p>Some of these fraudulent applications are listed under the Play Store\u2019s finance category and are described as cloud mining applications on the applications\u2019 display pages.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_4.png\" alt=\"The MineBit Pro - Crypto Cloud Mining &amp; btc miner application display page\"><figcaption>Figure 4. The MineBit Pro &#8211; Crypto Cloud Mining &amp; btc miner application display page<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"33.5\">\n<div readability=\"12\">\n<p>However, one of these apps\u2019 terms of use states that the app is merely a game that does not have any cryptocurrency-mining functionality. Hence, it will not be obligated to issue cryptocurrency payments to its users. It also does not guarantee a firm return for any virtual goods and features purchased in the app.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_5.png\" alt=\"The MineBit Pro - Crypto Cloud Mining &amp; btc miner application\u2019s Terms of Use and Important Information section\"><figcaption>Figure 5. The MineBit Pro &#8211; Crypto Cloud Mining &amp; btc miner application\u2019s Terms of Use and Important Information section<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"35.5\">\n<div readability=\"16\">\n<p>If users relied solely on how the application\u2019s UI is configured and designed and didn\u2019t read the app\u2019s terms of use, they may have used it and made in-app purchases without knowing that it\u2019s just a game.&nbsp;&nbsp;<\/p>\n<p><b>Fraudulent ad clicks<\/b><\/p>\n<p>Our investigation also found that some of these fake cryptomining applications prompted its users to click on ads instead of prodding them to pay for increased computing power. These apps, namely Bitcoin (BTC) \u2013 Pool Mining Cloud Wallet and Bitcoin 2021, have the following malicious features:<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">The interfaces are flooded with ads.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Users are prompted to click on ads during fraudulent cryptomining activities to prove that users are not robots.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Users are informed that they can start mining after viewing video ads within the app.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Users are informed to watch in-app video ads to increase mining speed.<\/span><\/li>\n<\/ul><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_6.png\" alt=\"Example of an ad shown on one fraudulent cryptocurrency-mining app\"><figcaption>Figure 6. Example of an ad shown on one fraudulent cryptocurrency-mining app<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_7.png\" alt=\"Code showing how video ads are shown when users click on the \u201cStart Mining\u201d button \"><figcaption>Figure 7. Code showing how video ads are shown when users click on the \u201cStart Mining\u201d button <\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"33.5\">\n<div readability=\"12\">\n<p><b>No cryptocurrency withdrawals supported<\/b><\/p>\n<p>Unfortunately, even if users browse in-app ads, they won\u2019t get any revenue. Users are prompted to invite several friends to download the app to unlock the withdrawal interface.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_8.png\" alt=\"Users are prompted to invite friends to unlock the withdrawal interface\"><figcaption>Figure 8. Users are prompted to invite friends to unlock the withdrawal interface<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_9.png\" alt=\"Screenshot of Bitcoin (BTC) \u2013 Pool Mining Cloud Wallet app\u2019s fake withdrawal response page\"><figcaption>Figure 9. Screenshot of Bitcoin (BTC) \u2013 Pool Mining Cloud Wallet app\u2019s fake withdrawal response page<\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"32.5\">\n<div readability=\"10\">\n<h2><span class=\"body-subhead-title\">How to recognize a fake cryptocurrency-mining app<\/span><\/h2>\n<p>The volatility of the cryptocurrency market is not it\u2019s only risk \u2014 those interested in mining cryptocurrency must also be aware of the fraudulent cryptocurrency-mining apps.<\/p>\n<p>We provide some helpful tips to determine whether a cryptomining app is fake or otherwise:<\/p>\n<ol>\n<li><b>Carefully read the app\u2019s reviews.<\/b> Fake apps will receive numerous 5-star reviews once they are released publicly, but don&#8217;t be fooled by these as they may be false and paid-for reviews. Pay more attention to 1-star reviews.<\/li>\n<\/ol><\/div>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_10a.png\" alt=\"1-star reviews from real users \"> <\/figure>\n<\/p><\/div>\n<div class=\"image\">\n<figure class=\"image-figure\"> <img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-\/Fake%20Cryptocurrency%20Mining%20Apps%20Trick%20Victims%20Into%20Watching%20Ads_10b.png\" alt=\"1-star reviews from real users \"><figcaption>Figure 10. 1-star reviews from real users <\/figcaption><\/figure>\n<\/p><\/div>\n<div class=\"richText\" readability=\"40.659264399722\">\n<div class=\"responsive-table-wrap\" readability=\"28.074253990285\">\n<ol>\n<li><b>Try to enter an invalid or wrong cryptocurrency wallet address.<\/b> After extensive analysis, we found that most of the malicious samples only process wallet addresses as non-empty values. Hence, if a user encodes an invalid wallet address and the app accepts it and is able to perform follow-up operations, there is a high probability that the app is fraudulent.<\/li>\n<li><b>Restart the app or phone while it is in the process of mining.<\/b> Most mining actions for fake apps are just simulated with local counters. This means that if a device is restarted after mining starts and the mining application is killed in the background, the system will forcibly clear the counter, resetting it to zero.<\/li>\n<li><b>Confirm if there is a withdrawal fee.<\/b> The transfer of cryptocurrency requires a handling fee, which is relatively high compared to what is typically made from cloud mining. Hence, free withdrawals are very suspicious.<\/li>\n<\/ol>\n<h2><span class=\"body-subhead-title\">Trend Micro Solutions<\/span><\/h2>\n<p>To avoid these types of threats, users can turn to security solutions that can alert users of fraudulent applications. &nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome\/products\/mobile-security.html\">Trend Micro\u2122&nbsp;Mobile Security<\/a>&nbsp;blocks malicious apps. End users can also benefit from its multilayered security capabilities that secure the device owner\u2019s data and privacy and protect them from ransomware, fraudulent websites, and identity theft.<\/p>\n<p>For organizations, the&nbsp;<a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps\/mobile.html\">Trend Micro\u2122&nbsp;Mobile Security for Enterprise<\/a>&nbsp;suite provides device, compliance and application management, data protection, and configuration provisioning, as well as protects devices from attacks that exploit vulnerabilities, prevents unauthorized access to apps and detects and blocks malware and fraudulent websites.&nbsp;<a href=\"https:\/\/mars.trendmicro.com\/\">Trend Micro\u2019s Mobile App Reputation Service<\/a>&nbsp;(MARS) covers Android and iOS threats using leading sandbox and&nbsp;<a href=\"https:\/\/www.trendmicro.com\/vinfo\/tmr\/?\/us\/security\/definition\/machine-learning\">machine learning<\/a>&nbsp;technologies to protect users against malware, zero-day and known exploits, privacy leaks, and application vulnerability.<\/p>\n<p><b>Indicators of compromise (IoCs)<\/b><\/p>\n<p>AndroidOS_FakeMinerPay<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"661\">\n<tbody readability=\"24.5\">\n<tr readability=\"3\">\n<td width=\"235\" valign=\"top\">\n<p><b>Package name<\/b><\/p>\n<\/td>\n<td width=\"77\" valign=\"top\">\n<p><b>App name<\/b><\/p>\n<\/td>\n<td width=\"85\" valign=\"top\" readability=\"5\">\n<p><b>Number of downloads (prior to being taken down)<\/b><\/p>\n<\/td>\n<td width=\"265\" valign=\"top\">\n<p><b>SHA-256<\/b><\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.btc.bitcoin.mining.crypto.miner.android.minebitpro<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>MineBit Pro &#8211; Crypto Cloud Mining &amp; btc miner 1.0<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>1,000+<\/p>\n<\/td>\n<td width=\"265\" valign=\"top\" readability=\"5\">\n<p>88e8185e26a6cdde904e77724fb809f2988a9f8cf7903aff854ee684aa633640<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.bucks.cryptoholic.activity<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>Crypto Holic \u2013 Bitcoin Cloud Mining<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>500+<\/p>\n<\/td>\n<td width=\"265\" readability=\"5\">\n<p>a2176ae59d771d408bb7445e0965e76dd45a5d4cace69037086283bbdb9e996e<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.serverpoolbtc.cryptocloudmining.freebitcoincashwallet<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>Bitcoin (BTC) \u2013 Pool Mining Cloud Wallet<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>5,000+<\/p>\n<\/td>\n<td width=\"265\" valign=\"top\" readability=\"5\">\n<p>12ac2a216f149413b63a508227bb53e149bba9d832c62e4b5e6020ac05a1cada<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"15\">\n<td width=\"235\" valign=\"top\">\n<p>com.task.cryptocloudpro<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>BitFunds \u2013 Crypto Cloud Mining<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>100,000+<\/p>\n<\/td>\n<td width=\"265\" valign=\"top\" readability=\"17\">\n<p>07503f042011c7efa71523e4eb207bfbe8108e6960de1ce8f493052f3f877493<\/p>\n<p>3df1aeda30ebb6918f14dac28106f9e75051a5763de1b0dea24de9211d9ccd6f<\/p>\n<p>d64d8ed789ae57983a712ba9b2077727437a270a2e67e4e602df6ffd260c331e<\/p>\n<p>d0ee26558438b6d3118ec6daee56d292695a5bec653a204ad65405760eab4ce8<\/p>\n<p>9d0ceddae407f8a69ead4cd0df219111367772f4e2093f616943ff3b406f2da5<\/p>\n<p>6234a51018e2ca49c9d4a1b0a2dbd6a0e517b5ca2f43650dc845afc32aa6846a<\/p>\n<p>e58165c0caa5f54460e0516a7c2bbb63be310f60119ae9bf3b8007603b396d2e<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.serverpooleth.cryptocloudmining.freewalletethereumcash<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>Ethereum (ETH) &#8211; Pool Mining Cloud<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>1,000+<\/p>\n<\/td>\n<td width=\"265\" valign=\"top\" readability=\"5\">\n<p>cb0c1ab8c0bf4650f6138abc228c15491fddc01c1f0ba7612749c42a62a74799<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.freebitcoin.reward.system<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>Daily Bitcoin Rewards \u2013 Cloud Based Mining System<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>200+<\/p>\n<\/td>\n<td width=\"265\" valign=\"top\" readability=\"5\">\n<p>cf13798ace8bcc59f503e0a094b83d5ff830ecc615044b6f6c5915134638265b<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"7.5\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.wMiningForever_13689132<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\">\n<p>Mining Forever<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>10,000+<\/p>\n<\/td>\n<td width=\"265\" readability=\"6\">\n<p>c414d081351df33c87279a1895415524e07394e3f99ef2fc80aefbb4b6467c88<br \/>5ff8583eed095d57b5344b1be8fffd0f7336f5ceee5cbd78d0a37ef2ae49f9f0<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"9\">\n<td width=\"235\" valign=\"top\" readability=\"5\">\n<p>com.wEthProMiner_13688903<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\">\n<p>Eth Pro Miner<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>10,000+<\/p>\n<\/td>\n<td width=\"265\" readability=\"9\">\n<p>90a50b0ab2cd45bc93938d0196165e1da0f709294499be31341f08f32d49a98e<\/p>\n<p>02c5dbe47c3cf2b2af533b9ecba0cc09c6787846dada6cbd3398aed5058766ac<\/p>\n<p>30d53377c80cb0b434f41f35218782f5b30d79fdef0178e3a09998b27d090678<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>AndroidOS_FakeMinerAd<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\" width=\"661\">\n<tbody readability=\"6\">\n<tr readability=\"3\">\n<td width=\"235\" valign=\"top\">\n<p><b>Package name<\/b><\/p>\n<\/td>\n<td width=\"77\" valign=\"top\">\n<p><b>App name<\/b><\/p>\n<\/td>\n<td width=\"85\" valign=\"top\" readability=\"5\">\n<p><b>Number of downloads (prior to being taken down)<\/b><\/p>\n<\/td>\n<td width=\"265\" valign=\"top\">\n<p><b>SHA-256<\/b><\/p>\n<\/td>\n<\/tr>\n<tr readability=\"3\">\n<td width=\"235\">\n<p>cloud.pro.btccrypto2021<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\">\n<p>Bitcoin 2021<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>5000+<\/p>\n<\/td>\n<td width=\"265\" readability=\"5\">\n<p>88e8185e26a6cdde904e77724fb809f2988a9f8cf7903aff854ee684aa633640<\/p>\n<\/td>\n<\/tr>\n<tr readability=\"13\">\n<td width=\"235\">\n<p>cryptominer.bitcoinminer<\/p>\n<\/td>\n<td width=\"77\" valign=\"top\" readability=\"5\">\n<p>Bitcoin Miner \u2013 Cloud Mining<\/p>\n<\/td>\n<td width=\"85\" valign=\"top\">\n<p>50000+<\/p>\n<\/td>\n<td width=\"265\" readability=\"11\">\n<p>13e2d06eba1ff7546c991d5019214dc9b803dfbc38c1ec0f974d45ba7e82cd9d<\/p>\n<p>76d54c3d926bbd261ee28b4e92be9b4b58f08c5230e7df4ecce88c41a8f7ee91<\/p>\n<p>deda27d066965cfdac3d2c71a92978794fa4e47d1c3c7b000d6346a515747a06<\/p>\n<p>8812a14a4eb1a18a5fcd738e87206939d929e5555fa88f3a5f52891702310714<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<section class=\"tag--list\">\n<p>Tags<\/p>\n<\/section>\n<p> <\/main> <\/article>\n<\/div>\n<\/div><\/div>\n<\/div>\n<p> <!-- \/* Core functionality javascripts, absolute URL to leverage Akamai CDN *\/ --> <!--For Modal-start--> <\/p>\n<p> <span>sXpIBdPeKzI9PC2p0SWMpUSM2NSxWzPyXTMLlbXmYa0R20xk<\/span> <\/p>\n<p> <!--For Modal-end--> <!-- Go to www.addthis.com\/dashboard to customize your tools --> <\/body> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/h\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We recently discovered eight deceptive mobile apps that masquerade as cryptocurrency cloud mining applications where users can earn cryptocurrency by investing money into a cloud-mining operation. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42384,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9511,9581,9509],"class_list":["post-42383","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-cyber-threats","tag-trend-micro-research-mobile","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-18T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png\" \/>\n\t<meta property=\"og:image:width\" content=\"322\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst\",\"datePublished\":\"2021-08-18T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/\"},\"wordCount\":1752,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Cyber Threats\",\"Trend Micro Research : Mobile\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/\",\"name\":\"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png\",\"datePublished\":\"2021-08-18T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png\",\"width\":322,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-research-articles-news-reports\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/","og_locale":"en_US","og_type":"article","og_title":"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-08-18T00:00:00+00:00","og_image":[{"width":322,"height":214,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst","datePublished":"2021-08-18T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/"},"wordCount":1752,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Cyber Threats","Trend Micro Research : Mobile","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/","url":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/","name":"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png","datePublished":"2021-08-18T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/08\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst.png","width":322,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/fake-cryptocurrency-mining-apps-trick-victims-into-watching-ads-paying-for-subscription-service-mobile-threats-analyst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Fake Cryptocurrency Mining Apps Trick Victims Into Watching Ads, Paying for Subscription Service Mobile Threats Analyst"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42383","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42383"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42383\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42384"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}