{"id":5234,"date":"2025-12-04T07:57:20","date_gmt":"2025-12-04T07:57:20","guid":{"rendered":"https:\/\/adex.com\/?p=5234"},"modified":"2026-04-23T10:54:28","modified_gmt":"2026-04-23T10:54:28","slug":"triada-malvertising-case-study","status":"publish","type":"post","link":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/","title":{"rendered":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered"},"content":{"rendered":"\n<p>Adex, an anti-fraud platform that helps advertisers detect suspicious events within their traffic immediately, has recently uncovered a new generation of the notorious Triada malware \u2013 a threat we\u2019ve been battling since 2020.&nbsp;<\/p>\n\n\n\n<p>Over the past years, this Trojan has grown increasingly aggressive and sophisticated. Today, every major ad network faces its impact, as Triada continuously evolves, deploying new fraud schemes, data-theft techniques, and methods to hijack advertiser accounts and budgets.<\/p>\n\n\n\n<p>Read on to discover how Adex experts and Business Security &amp; Compliance teams of the PropellerAds advertising platform traced and exposed a fraud ring that attempted to use advertiser accounts across major ad networks to distribute Android malware, in some cases through reputable platforms, like GitHub and Discord.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-triada-and-how-attackers-profit-from-it\">What is Triada and How Attackers Profit From It?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.darktrace.com\/blog\/triaging-triada-understanding-an-advanced-mobile-trojan-and-how-it-targets-communication-and-banking-applications\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Triada<\/a> is an Android Trojan first identified in 2016. It began as a modular backdoor and rootkit, granting attackers privileged access and enabling the malware to infiltrate deeply into Android system processes.&nbsp;<\/p>\n\n\n\n<p>What started as an advanced Android backdoor has evolved into a fully fledged mobile cybercrime tool, growing more sophisticated with every new iteration.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#d6d6d630\">Over time, Triada has significantly expanded its capabilities: it can steal sensitive data, hijack communication apps, inject unwanted ads, subscribe users to paid services, and even replace cryptocurrency wallet addresses. Its scale is especially alarming because it targets major apps millions rely on daily \u2013 including WhatsApp, Facebook, and Gmail.<\/p>\n\n\n\n<p>According to the latest statistics, in the third quarter of 2025 alone, Triada ranked among the leading mobile threats, <a href=\"https:\/\/securelist.com\/malware-report-q3-2025-mobile-statistics\/118013\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">accounting for 15.78% of all detected infections.<\/a><\/p>\n\n\n\n<p>But how does it reach the device?<\/p>\n\n\n\n<p>Triada spreads through several channels, each designed to maximize reach and monetization. Here are the main methods attackers use:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"1-infection-via-modified-apps\"><strong>1. Infection via Modified Apps<\/strong><\/h3>\n\n\n\n<p>A major distribution vector has been modified Android apps such as FMWhatsApp or YoWhatsApp. These unofficial versions were often promoted via paid ads or social media posts, luring users with claims like \u201cenhanced WhatsApp with even more features.\u201d&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-38.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"360\" height=\"561\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-38.png\" alt=\"adex-triada-case-study-fake-whatsapp-app\" class=\"wp-image-5244\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-38.png 360w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-38-193x300.png 193w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><em>Screenshot from suspended campaign<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"2-pre-installation-on-counterfeit-devices\"><strong>2. Pre-installation on Counterfeit Devices<\/strong><\/h3>\n\n\n\n<p>In 2025, a massive campaign was uncovered: <a href=\"https:\/\/www.kaspersky.com\/blog\/trojan-in-fake-smartphones\/53331\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Triada was preinstalled on counterfeit Android smartphones sold through online marketplaces<\/a>. These phones were heavily advertised as \u201ccheap, limited-time offer devices\u201d.<\/p>\n\n\n\n<p>When purchased, the Trojan was already present in the firmware, activating on first boot.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fraudulent-schemes\"><strong>Fraudulent Schemes<\/strong><\/h3>\n\n\n\n<p>After the device is infected, Triada can activate one or multiple advertising-related and traffic-manipulation techniques, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ad redirection &amp; click hijacking:<\/strong> swapping genuine ads with their own placements to generate impressions, clicks, and revenue.<\/li>\n\n\n\n<li><strong>Forced premium subscriptions: <\/strong>secretly subscribing users to premium SMS or paid content on-demand services, mimicking real ad offers.<\/li>\n\n\n\n<li><strong>Affiliate fraud:<\/strong> redirecting traffic from real ad networks to fake (fraudulent) ones, faking conversions or views.<\/li>\n\n\n\n<li><strong>Crypto wallet address replacement:<\/strong> not purely advertising-related, but part of the broader fraud strategy \u2013 diverting payments to attacker-controlled wallets.<\/li>\n<\/ul>\n\n\n\n<p>In other words, Triada is far more than a payment-data stealer \u2013 it\u2019s a rapidly evolving, multi-purpose threat with expanding capabilities. That\u2019s why stopping its distribution is critical.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-adex-has-uncovered\">What Adex Has Uncovered<\/h2>\n\n\n\n<p>Since 2020, we have been tracking a highly organized threat actor with activity patterns pointing to Turkey that systematically attempted to register advertiser accounts as a delivery vector for this malware.<\/p>\n\n\n\n<p><a href=\"https:\/\/securelist.com\/malware-report-q3-2025-mobile-statistics\/118013\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Latest statistics<\/a> indicate that Turkey ranks among the top regions targeted by mobile trojans:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-stats.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1506\" height=\"1194\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-stats.png\" alt=\"\" class=\"wp-image-5245\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-stats.png 1506w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-stats-300x238.png 300w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-stats-1024x812.png 1024w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-stats-768x609.png 768w\" sizes=\"(max-width: 1506px) 100vw, 1506px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><em>Source: <a href=\"https:\/\/securelist.com\/malware-report-q3-2025-mobile-statistics\/118013\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Securelist.com<\/a><\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>To date, Adex specialists have identified three major waves of Triada-related attacks and permanently banned more than 500 compromised advertiser accounts.&nbsp;<\/p>\n<\/blockquote>\n\n\n\n<p>Over the years, the malware itself has evolved dramatically. Since 2020, we\u2019ve seen it cycle through a series of distribution tactics, including slipping into seemingly ordinary software, experimenting with new delivery channels, attempting to buy ad traffic, and directing users toward its infected sources. <\/p>\n\n\n<div class=\"block__bord\"><div class=\"block__bord_desc\"><p>The actors behind it probed for weaknesses in our automated defenses, trying to understand how our detection patterns worked. But throughout this cat-and-mouse chase, moderators kept a close watch, shutting down each new attempt as it surfaced. In many ways, the confrontation has resembled a long, high-stakes boxing match &#8211; tense, technical, and relentless, but so far, every round has gone our way. Now we\u2019re ready to walk through these rounds one by one and show how the fight unfolded.<\/p>\n<\/div><\/div>\n<style>\n.block__bord { margin: 32px 0; padding: 1.25em 2.375em;\tborder-radius: 24px; background: rgba(0, 220, 200, 0.20); }\n.block__bord_desc {font-size: 16px !important;font-weight: 400 !important;color: #606060 !important;}\n<\/style>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"round-1-2020-2021\"><strong>Round 1 (2020-2021)<\/strong><\/h3>\n\n\n\n<p>Our first hands-on encounter with Triada occurred in August 2020, when the Adex team detected unusual activity among a cluster of PropellerAds advertisers presenting themselves as being from Turkey.<\/p>\n\n\n\n<p>Following the initial investigation, it became clear that the advertisers had attempted to pass the KYC procedure with documents that appeared authentic at first glance but were in fact crude forgeries, the kind of falsifications that fail even basic verification checks.<\/p>\n\n\n\n<p>When these advertisers tried to fund their accounts, our systems immediately flagged the payment attempts as matching known carding patterns, triggering an automatic block. The actors persisted, repeatedly attempting to complete payments with different compromised card details, but the safeguards held: every transaction was stopped in time, and not a single cent was lost from legitimate cardholders. Manual verification and further inquiries only confirmed our assumptions, and the campaign launch was denied.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>At the campaign settings, the attackers relied on landing pages disguised as \u201cTurkish government citizen support\u201d portals (<strong><em>vatandasdestek<\/em><\/strong><strong> <\/strong>\u2013 literally \u201ccitizen support\u201d). Local Turkish URL shorteners redirected users to apkuploads.com, which then triggered the automatic download of a file named <strong>googleplay.apk<\/strong> \u2013 the Triada payload.<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-37.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"360\" height=\"2142\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-37.png\" alt=\"\" class=\"wp-image-5246\" style=\"width:140px;height:auto\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-37.png 360w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-37-172x1024.png 172w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-37-258x1536.png 258w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-37-344x2048.png 344w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><em>Screenshot from suspended campaign<\/em><\/p>\n\n\n\n<p>In parallel, additional dropper channels were used, including the Discord CDN (cdn.discordapp.com\/attachments\/&#8230;\/googleplay.apk) and the kisa.link shortener.<\/p>\n\n\n\n<p>Here are some of the accounts identified as fraudulent:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Email<\/strong><\/td><td><strong>GEO<\/strong><\/td><td><strong>IP<\/strong><\/td><\/tr><tr><td>kurtu**us1**5@gmail.com<\/td><td>TR<\/td><td>188.57.1*5.2*9<\/td><\/tr><tr><td>t**<em>nguney<\/em>@gmail.com<\/td><td>TR<\/td><td>5.*4.1*9.1<\/td><\/tr><tr><td>do***binboy**@gmail.com<\/td><td>TR<\/td><td>37.1*4.2*9.12<\/td><\/tr><tr><td>***azanekiz1**@outlook.com<\/td><td>TR<\/td><td>37.1*4.*50.77<\/td><\/tr><tr><td>**anglin***@gmail.com<\/td><td>ME<\/td><td>62.4.*5.*25<\/td><\/tr><tr><td>a***tkent*7@gmail.com<\/td><td>TR<\/td><td>46.1*5.147.1*9<\/td><\/tr><tr><td>***ufkazan9**@gmail.com<\/td><td>TR<\/td><td>178.2*4.79.1*1<\/td><\/tr><tr><td>i***s32***2@outlook.com<\/td><td>TR<\/td><td>85.1*3.203.1*2<\/td><\/tr><tr><td>s***eaki*@gmail.com<\/td><td>TR<\/td><td>5.2*.42.1*0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Fighting fraud requires constant adaptation, staying one step ahead, and a willingness to learn from every encounter. After studying the behavior of the attackers and the signals they left behind, the Adex team recommended tightening identity checks to stop any future attempts involving forged documents. Acting on these insights, PropellerAds partnered with <a href=\"https:\/\/sumsub.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Sumsub<\/a>, a leading identity verification provider, to build a more resilient KYC process capable of filtering out even the most convincing fake IDs.<\/p>\n\n\n\n<p>At the same time, the platform enhanced its payment-screening sensitivity, ensuring that suspicious carding patterns are detected and blocked long before any damage can occur. This upgrade further enhanced the network&#8217;s ability to detect fraudulent identities early, protect advertiser accounts, and ensure a safer, more trustworthy ecosystem for all.<\/p>\n\n\n\n<p>We held our ground during the first round.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"round-2-2022-2024\"><strong>Round 2 <\/strong><strong>(2022-2024)<\/strong><\/h3>\n\n\n\n<p>The second wave marked a clear shift in the attackers\u2019 tactics. Instead of trying to slip past KYC with questionable documents or triggering payment blocks with suspicious top-up attempts, they switched to a far more calculated approach: compromising long-standing, fully verified advertiser accounts. Once inside these genuine accounts, the attackers attempted to repurpose them as a delivery channel for malware, routing traffic through their own domains and cloaking setups.<\/p>\n\n\n\n<p>This new generation of Triada activity was confirmed only after a long-time verified advertiser noticed that one of his campaigns had been blocked and reached out to us for clarification. He had lost access to his account, and our investigation revealed that attackers had taken control and attempted to run suspicious ads using his credentials.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Upon further investigation, it became clear that the advertiser had been reusing the same password across multiple services and had not enabled two-factor authentication. When his email appeared in data leaks and was subsequently hijacked, fraudsters had little difficulty gaining access to his advertiser account.<\/p>\n<\/blockquote>\n\n\n\n<p>Our automated system immediately flagged an anomaly: the advertiser typically logged in from France, yet a simultaneous login from Turkey was detected \u2013 a clear deviation from his normal behavior.<\/p>\n\n\n\n<p>Using the compromised account, the attackers tried to create several campaigns targeting Turkey, each containing cloaked redirect chains.&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The attackers used a cloaking setup targeting Turkey, where the target URL (<strong>tasartasartasarla.com<\/strong>) served only as the first step in a multi-layer redirect chain.<\/p>\n<\/blockquote>\n\n\n\n<p>After the click, users were forwarded to GitHub, and then to <strong>raw.githubusercontent.com<\/strong>, where the actual malicious payload or loader script was hosted.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1600\" height=\"748\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github.png\" alt=\"adex-triada-infected-campaigns-case-study-github\" class=\"wp-image-5247\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github.png 1600w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github-300x140.png 300w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github-1024x479.png 1024w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github-768x359.png 768w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-github-1536x718.png 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/a><\/figure>\n\n\n\n<p><em>One of the fraudulent APKs is still available on GitHub. We have submitted an official request to GitHub regarding this malware.<\/em><\/p>\n\n\n<div class=\"block__bord\"><div class=\"block__bord_desc\"><p>This technique allowed fraudsters to hide the real destination behind high-trust domains (GitHub and its CDN), passing moderation and security checks in various advertising networks. It also aligned with other Triada campaigns, where GitHub, Discord CDN, and local shorteners were used as \u201cclean\u201d intermediaries to mask the delivery of the APK.<\/p>\n<\/div><\/div>\n<style>\n.block__bord { margin: 32px 0; padding: 1.25em 2.375em;\tborder-radius: 24px; background: rgba(0, 220, 200, 0.20); }\n.block__bord_desc {font-size: 16px !important;font-weight: 400 !important;color: #606060 !important;}\n<\/style>\n\n\n\n<p>To ensure that client accounts remain protected \u2013 even when some advertisers are careless with their passwords \u2013 PropellerAds has implemented, by default, two-factor authentication for all advertiser accounts, with verification via both SMS and email.<\/p>\n\n\n\n<p>We claimed another round.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"round-3-2025-now\"><strong>Round 3 (2025 &#8211; Now)<\/strong><\/h3>\n\n\n\n<p>The latest iteration of Triada has already emerged: attackers now use phishing pre-landers disguised as Chrome browser updates, while the malicious files themselves are hosted on GitHub.<\/p>\n\n\n\n<p>Here\u2019s a typical example of such a pre-lander:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-fake-chrome-updates.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"576\" height=\"1280\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-fake-chrome-updates.jpg\" alt=\"adex-triada-infected-campaigns-fake-chrome-updates\" class=\"wp-image-5248\" style=\"width:468px;height:auto\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-fake-chrome-updates.jpg 576w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-fake-chrome-updates-135x300.jpg 135w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-case-study-fake-chrome-updates-461x1024.jpg 461w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><em>Screenshot from suspended campaign<\/em><\/p>\n\n\n\n<p>During the analysis, we identified that the attackers were not relying solely on Triada. They also distributed other banking stealers using similar cloaking chains but with different initial domains, for example, <strong>loreastrock.com.<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"635\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-4-1024x635.png\" alt=\"adex-triada-infected-campaigns\" class=\"wp-image-5240\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-4-1024x635.png 1024w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-4-300x186.png 300w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-4-768x476.png 768w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-4.png 1290w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"796\" height=\"66\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-proof.png\" alt=\"adex-triada-infected-campaigns\" class=\"wp-image-5249\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-proof.png 796w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-proof-300x25.png 300w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-triada-infected-campaigns-proof-768x64.png 768w\" sizes=\"(max-width: 796px) 100vw, 796px\" \/><\/figure>\n\n\n\n<p>The <a href=\"https:\/\/www.virustotal.com\/gui\/file\/a8a4b1471b29a1821344142db3840dd7306fe1f1b936311af67a77f53b035ac8?nocache=1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">VirusTotal data<\/a> linked to these campaigns also revealed multiple hijacked accounts with suspicious logins originating from Turkey and India. This confirmed that attackers were actively taking over long-standing, fully verified advertiser accounts to distribute malicious redirects.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-3.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" width=\"1334\" height=\"802\" src=\"https:\/\/adex.com\/blog\/\/wp-content\/uploads\/2025\/12\/image-3.png\" alt=\"\" class=\"wp-image-5239\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-3.png 1334w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-3-300x180.png 300w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-3-1024x616.png 1024w, https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/image-3-768x462.png 768w\" sizes=\"(max-width: 1334px) 100vw, 1334px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-small-font-size\"><em>Source: <a href=\"https:\/\/www.virustotal.com\/gui\/file\/a8a4b1471b29a1821344142db3840dd7306fe1f1b936311af67a77f53b035ac8?nocache=1\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Virus Total<\/a><\/em><\/p>\n\n\n\n<p>Here are some of the identified accounts:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Email<\/strong><\/td><td><strong>GEO<\/strong><\/td><td><strong>IP<\/strong><\/td><\/tr><tr><td>qi***jami**@gmail.com<\/td><td>TRIN<\/td><td>5.1*7.1*4.221<br>139.1*7.170.*22<\/td><\/tr><tr><td>***rhat9*0@gmail.com<\/td><td>TR<\/td><td>46.*06.19.*8 88.*44.2*5.230 78.1*0.1*2.20<\/td><\/tr><tr><td>xli*48**@gmail.com<\/td><td>TR<\/td><td>46.2*1.2**.22 46.2*1.1*3.20<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Fraudsters increasingly use reputable platforms like GitHub or Discord to host payloads or disguise malicious redirects, meaning a \u201cclean\u201d domain is not a guarantee of clean intent. As a result, Adex specialists designed a tailored solution capable of thoroughly analyzing each campaign for potential threats. <\/p>\n\n\n\n<p>Today, every campaign passing through PropellerAds, even those pointing to well-known, trusted websites, undergoes rigorous scrutiny, ensuring that malicious activity is identified and blocked before it can cause harm.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"the-bottom-line\">The Bottom Line<\/h2>\n\n\n\n<p>Triada\u2019s evolution reads like a masterclass in adaptation, moving from crude document forgeries to hijacking trusted accounts and finally deploying ever more sophisticated cloaking techniques.&nbsp;<\/p>\n\n\n\n<p>But this was far from a one-sided fight. Adex specialists studied every move, every anomaly, and every signal left by the attackers, while PropellerAds fortified its defenses and monitored campaigns in real time.&nbsp;<\/p>\n\n\n\n<p>Together, they turned the tide, intercepting each wave before it could scale, outsmarting the fraudsters at every turn, and uncovering critical gaps in the platform that were immediately reinforced to make the battlefield theirs for the long haul. When the next round comes, they would be ready &#8211; gloves up, eyes sharp, and in control of the ring.&nbsp;<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-has-been-improved\"><strong>What Has Been Improved<\/strong><\/h3>\n\n\n\n<p>To ensure stronger protection and to offer a tested model that other ad networks can follow, PropellerAds introduced several critical upgrades to its traffic quality framework and clients\u2019 security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stricter KYC procedures. <\/strong>To reduce the risk of forged or illegally obtained identity documents slipping through, PropellerAds integrated SumSub for an even more enhanced identity verification process.<\/li>\n\n\n\n<li><strong>Two-factor authentication is selected by default, and login anomaly monitoring. <\/strong>All advertiser accounts now require two-factor authentication by default (with verification via SMS or email). Additionally, automated monitoring systems were introduced to flag non-typical geolocations and concurrent sessions.<\/li>\n\n\n\n<li><strong>Complete checks for absolutely every domain or ad campaign. <\/strong>Since even trusted domains, such as GitHub and Discord, are increasingly abused by attackers, PropellerAds now applies a \u201czero trust\u201d policy to all redirects, landing pages, and campaign target URLs \u2013 no exceptions.<\/li>\n<\/ul>\n\n\n\n<p>These measures significantly raise the barrier for potential attackers and help ensure that no malicious campaign can reach scale, even as fraud tactics evolve. Still, since attackers continually refine their methods and attempt to exploit advertising platforms for malware distribution, achieving zero incidents is unrealistic, which makes continued investment in security essential for every company.<\/p>\n\n\n\n<p>To stay protected, advertisers should also follow essential security practices: use strong and unique passwords, enable two-factor authentication, avoid opening suspicious emails or links, and always double-check the domain before logging into their accounts. These simple steps significantly reduce the risk of account hijacking and help keep the advertising ecosystem safer for everyone.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>We also invite other advertising platforms, traffic specialists, and anti-fraud teams to <a href=\"mailto:contact.us@adex.com\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">collaborate on this effort<\/a>. Sharing intelligence, reporting emerging threats, and collaborating on malware detection are key to stopping large-scale fraud attacks. Together, we can make the digital advertising ecosystem stronger, safer, and far more resilient against evolving threats like Triada.<\/p>\n<\/blockquote>\n\n\n<div class=\"block__preview\">\n        <a href=\"https:\/\/adex.com\/blog\/phishing-alert-telegram-fraud\/\" class=\"block__preview_img\"><img src=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/07\/Adex-Telegram-fraud-account-hijacking.png\" srcset=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/07\/Adex-Telegram-fraud-account-hijacking.png\" sizes=\"100vw\" alt=\"Adex-Telegram-fraud-account-hijacking\" decoding=\"async\" class=\"lazy\"><\/a>\n    <div class=\"block__preview_box\">\n        <a href=\"https:\/\/adex.com\/blog\/category\/current_risks\/\" class=\"block__preview_box-cat\">Current risks<\/a>        <h3 class=\"block__preview_box-title\" id=\"phishing-scam-alert-telegram-fraud-and-account-hijacking-prevented\"><a href=\"https:\/\/adex.com\/blog\/phishing-alert-telegram-fraud\/\">[Phishing Scam Alert] Telegram Fraud and Account Hijacking Prevented<\/a><\/h3>\n    <\/div>\n<\/div>\n<style>\n.block__preview {display: flex;align-items: center;justify-content: center; margin: 32px 0;}\n.block__preview a {text-decoration: none;}\n.block__preview_img {min-width: 360px;max-width: 360px;min-height: 188px;width: 100%;height: 100%;}\n.block__preview_img img {width: 100%;height: 100%;}\n.block__preview_box {margin-left: 40px;max-width: 360px;}\n.block__preview_box-cat {color: #00B8A7 !important;font-weight: 600;font-size: 12px;line-height: 16px;text-transform: uppercase; display: block; margin-bottom: 4px;}\n.block__preview_box-cat:hover {color: #FE645A !important; text-decoration: none !important;}\n.block__preview_box-title {font-size: 20px;font-weight: 700;line-height: 24px;color: #0B172D;}\n.block__preview_box-title a {color: #0B172D !important;}\n.block__preview_box-title a:hover {color: #FE645A !important;}\n@media screen and (max-width: 768px) {.block__preview {flex-direction: column;}.block__preview_box {max-width: 100%; margin-top: 32px;margin-left: 0px;}.block__preview_img {max-width: 100%;min-width: 100%;min-height: 100%;}}<\/style>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"update-from-december-8-2025\">Update from December 8, 2025<\/h3>\n\n\n\n<p>GitHub has reviewed our report and confirmed that the account involved was indeed in violation of their Terms of Service. They have taken appropriate action on their side:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>&#8220;Hello,<br>Our review of the account named in your report has concluded. We have determined that one or more violations of GitHub\u2019s Terms of Service have occurred and have taken appropriate action in response.&#8221;<\/em><\/p>\n<\/blockquote>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>About Adex<\/strong><\/p>\n\n\n\n<p>Adex is the anti-fraud and traffic-quality solution within AdTech Holding, a company that unites several major products in the performance marketing industry \u2013 including PropellerAds, Notix, and Zeydoo.<\/p>\n\n\n\n<p>Built as a unified fraud-detection and traffic-validation engine, Adex analyzes billions of impressions, clicks, and conversions from multiple platforms.<\/p>\n\n\n\n<p>Products across AdTech Holding \u2013 from PropellerAds to Zeydoo \u2013 rely on Adex to filter invalid traffic, flag compromised accounts, and prevent malware-driven campaigns from entering the ecosystem.<\/p>\n\n\n    <div class=\"block__buttons\">\n        <a href=\"https:\/\/app.adex.com\/auth\/register\" class=\"block__buttons_btn\">Join ADEX<\/a>    <\/div>\n<style>\n    .block__buttons {\n        text-align: center;\n    }\n\n    .block__buttons_btn {\n        background-color: rgba(254, 100, 90, 1) !important;\n        border-radius: 200px !important;\n        padding: 16px 24px !important;\n        font-weight: 600 !important;\n        font-size: 18px !important;\n        line-height: 24px !important;\n        text-align: center !important;\n        display: inline-block !important;\n        color: #fff !important;\n        text-decoration: none !important;\n        text-transform: uppercase !important;\n    }\n\n    .block__buttons_btn:hover {\n        color: rgba(11, 31, 58, 1) !important;\n    }\n<\/style>\n","protected":false},"excerpt":{"rendered":"<p>Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.<\/p>\n","protected":false},"author":4,"featured_media":5251,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[18,16,17],"class_list":["post-5234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-current_risks","tag-fraud","tag-threat","tag-virus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered.<\/title>\n<meta name=\"description\" content=\"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered\" \/>\n<meta property=\"og:description\" content=\"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/\" \/>\n<meta property=\"og:site_name\" content=\"ADEX\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adexsaas\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-04T07:57:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T10:54:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-investigarion-triada-infected-campaigns.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Content Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered\" \/>\n<meta name=\"twitter:description\" content=\"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.\" \/>\n<meta name=\"twitter:creator\" content=\"@adexsaas\" \/>\n<meta name=\"twitter:site\" content=\"@adexsaas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Content Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/\"},\"author\":{\"name\":\"Content Team\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/person\\\/2bf2469195f0e5bffe2e1d5b2ef12b61\"},\"headline\":\"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered\",\"datePublished\":\"2025-12-04T07:57:20+00:00\",\"dateModified\":\"2026-04-23T10:54:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/\"},\"wordCount\":2124,\"publisher\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/adex-investigarion-triada-infected-campaigns.png\",\"keywords\":[\"Fraud\",\"Threat\",\"Virus\"],\"articleSection\":[\"Current risks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/\",\"name\":\"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/adex-investigarion-triada-infected-campaigns.png\",\"datePublished\":\"2025-12-04T07:57:20+00:00\",\"dateModified\":\"2026-04-23T10:54:28+00:00\",\"description\":\"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/adex-investigarion-triada-infected-campaigns.png\",\"contentUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/12\\\/adex-investigarion-triada-infected-campaigns.png\",\"width\":1200,\"height\":628,\"caption\":\"adex-investigation-triada-infected-campaigns\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/triada-malvertising-case-study\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/adex.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/\",\"name\":\"ADEX - Ad Fraud & Invalid Traffic Prevention Platform\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#organization\"},\"alternateName\":\"ADEX\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adex.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#organization\",\"name\":\"ADEX - Ad Fraud & Invalid Traffic Prevention Platform\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/CDD2258_copy-48-1.svg\",\"contentUrl\":\"https:\\\/\\\/adex.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/CDD2258_copy-48-1.svg\",\"width\":148,\"height\":30,\"caption\":\"ADEX - Ad Fraud & Invalid Traffic Prevention Platform\"},\"image\":{\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adexsaas\\\/\",\"https:\\\/\\\/x.com\\\/adexsaas\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/adex.com\\\/blog\\\/#\\\/schema\\\/person\\\/2bf2469195f0e5bffe2e1d5b2ef12b61\",\"name\":\"Content Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc59bc385c83827a6549fd86c717ef334484d083fba0e770f9b2365acdf272f2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc59bc385c83827a6549fd86c717ef334484d083fba0e770f9b2365acdf272f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cc59bc385c83827a6549fd86c717ef334484d083fba0e770f9b2365acdf272f2?s=96&d=mm&r=g\",\"caption\":\"Content Team\"},\"sameAs\":[\"https:\\\/\\\/adex.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered.","description":"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/","og_locale":"en_US","og_type":"article","og_title":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered","og_description":"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.","og_url":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/","og_site_name":"ADEX","article_publisher":"https:\/\/www.facebook.com\/adexsaas\/","article_published_time":"2025-12-04T07:57:20+00:00","article_modified_time":"2026-04-23T10:54:28+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-investigarion-triada-infected-campaigns.png","type":"image\/png"}],"author":"Content Team","twitter_card":"summary_large_image","twitter_title":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered","twitter_description":"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.","twitter_creator":"@adexsaas","twitter_site":"@adexsaas","twitter_misc":{"Written by":"Content Team","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#article","isPartOf":{"@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/"},"author":{"name":"Content Team","@id":"https:\/\/adex.com\/blog\/#\/schema\/person\/2bf2469195f0e5bffe2e1d5b2ef12b61"},"headline":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered","datePublished":"2025-12-04T07:57:20+00:00","dateModified":"2026-04-23T10:54:28+00:00","mainEntityOfPage":{"@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/"},"wordCount":2124,"publisher":{"@id":"https:\/\/adex.com\/blog\/#organization"},"image":{"@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-investigarion-triada-infected-campaigns.png","keywords":["Fraud","Threat","Virus"],"articleSection":["Current risks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/","url":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/","name":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered.","isPartOf":{"@id":"https:\/\/adex.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#primaryimage"},"image":{"@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-investigarion-triada-infected-campaigns.png","datePublished":"2025-12-04T07:57:20+00:00","dateModified":"2026-04-23T10:54:28+00:00","description":"Adex exposes a new iteration of the Triada malware, shedding light on how this persistent threat has adapted to evade detection and exploit ad traffic.","breadcrumb":{"@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adex.com\/blog\/triada-malvertising-case-study\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#primaryimage","url":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-investigarion-triada-infected-campaigns.png","contentUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2025\/12\/adex-investigarion-triada-infected-campaigns.png","width":1200,"height":628,"caption":"adex-investigation-triada-infected-campaigns"},{"@type":"BreadcrumbList","@id":"https:\/\/adex.com\/blog\/triada-malvertising-case-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/adex.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Inside the Triada Battle: A Five-Year Investigation and the Security Upgrades It Triggered"}]},{"@type":"WebSite","@id":"https:\/\/adex.com\/blog\/#website","url":"https:\/\/adex.com\/blog\/","name":"ADEX - Ad Fraud & Invalid Traffic Prevention Platform","description":"","publisher":{"@id":"https:\/\/adex.com\/blog\/#organization"},"alternateName":"ADEX","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adex.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/adex.com\/blog\/#organization","name":"ADEX - Ad Fraud & Invalid Traffic Prevention Platform","url":"https:\/\/adex.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adex.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/CDD2258_copy-48-1.svg","contentUrl":"https:\/\/adex.com\/blog\/wp-content\/uploads\/2022\/05\/CDD2258_copy-48-1.svg","width":148,"height":30,"caption":"ADEX - Ad Fraud & Invalid Traffic Prevention Platform"},"image":{"@id":"https:\/\/adex.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/adexsaas\/","https:\/\/x.com\/adexsaas"]},{"@type":"Person","@id":"https:\/\/adex.com\/blog\/#\/schema\/person\/2bf2469195f0e5bffe2e1d5b2ef12b61","name":"Content Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/cc59bc385c83827a6549fd86c717ef334484d083fba0e770f9b2365acdf272f2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cc59bc385c83827a6549fd86c717ef334484d083fba0e770f9b2365acdf272f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc59bc385c83827a6549fd86c717ef334484d083fba0e770f9b2365acdf272f2?s=96&d=mm&r=g","caption":"Content Team"},"sameAs":["https:\/\/adex.com"]}]}},"_links":{"self":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts\/5234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/comments?post=5234"}],"version-history":[{"count":1,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts\/5234\/revisions"}],"predecessor-version":[{"id":5505,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/posts\/5234\/revisions\/5505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/media\/5251"}],"wp:attachment":[{"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/media?parent=5234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/categories?post=5234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adex.com\/blog\/wp-json\/wp\/v2\/tags?post=5234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}