HUMAN Blog

Poseidon’s Offspring: Charybdis and Scylla

Researchers: Nico Agnese, Vikas Parthasarathy, Joao Santos, Adam Sell, Inna Vasilyeva

In this post:

  • HUMAN’s Satori Threat Intelligence & Research team discovered an operation we’re calling Scylla (pronounced SILL-uh). It’s the third wave of an attack we first reported in August 2019; the second wave, which we’re calling Charybdis (pronounced kuh-RIB-diss), cropped up in late 2020.
  • The attacks target a number of advertising SDKs within apps available via both Google’s Play Store and Apple’s App Store.
  • Apps associated with the Scylla operation have been downloaded 13+ million times.
  • This attack is ongoing; HUMAN and the Satori team continue to pursue the operation and its perpetrators.

 

Introduction

“Modern defense” is the strategy behind protecting the internet and the advertising ecosystem from fraud through a combination of internet observability, collective protection, and actionable intelligence with disruptions of fraud operations when they’re uncovered. This strategy is the basis of how HUMAN works to safeguard the internet from digital attacks, disrupt the economics of cybercrime, and reduce the cost of collective protection for customers.

Three years ago, in August of 2019, HUMAN’s (then White Ops) Satori team reported about a collection of 40+ Android apps openly committing multiple types of advertising fraud. That investigation, which we named Poseidon after the malicious code within the apps, resulted in Google removing the apps from their Play Store.

A disruption that results in dismantling the infrastructure powering a fraud scheme is rare. In the case of the original Poseidon operation, we weren’t in a position to disrupt the infrastructure in that way, but we were able to work with the Google Play Store team to remove the malicious apps and ensure that the proliferation of that wave of the scheme stopped.

Poseidon is back again, unsurprisingly. This adaptation, which we’ve dubbed Scylla, showcases new tactics and techniques these threat actors have deployed to try and cover their tracks better than in earlier adaptations.

They have also expanded their attack to more parts of the digital advertising ecosystem, further underscoring the importance of collective protection to stop fraud at the source:

  • The Scylla operation featured 75+ Android apps and 10+ iOS apps committing several flavors of ad fraud. These apps generated 13+ million downloads in total before they were taken down.
  • Satori partnered with the security teams at Google’s Play Store and Apple’s App Store. HUMAN provided indicators of compromise (IOCs) and other evidence involving the malicious Scylla code. Google and Apple responded promptly to the threat, expanding the ring of apps and removing them from their respective stores.
  • HUMAN’s customers are protected from attacks on the digital advertising ecosystem through our media security solutions, including MediaGuard.


Poseidon, the father

Before we can dive into the specifics of how the Charybdis and Scylla operations worked, it’s helpful to have the context of how the original Poseidon phase of the scheme functioned and how the Satori team found it.

The 2019 Poseidon operation consisted of more than 40 Android apps openly committing ad fraud within their code. The apps in question displayed ads out of context or hidden from view of the device user, both of which are classic mechanisms within the broader ad fraud category of Misleading User Interface (PDF).

What made the Poseidon operation interesting was its use of “receivers” to trigger these ads to load. Receivers are, generally speaking, useful little bits of code that tell an app when something has changed with respect to the device. For example, a receiver monitors when a phone has been put into Airplane Mode, and then instructs the app to stop trying to connect to the internet until Airplane Mode is turned off again.

However, well-intended and useful elements of code can be twisted to serve criminal goals. In the case of Poseidon, a receiver designed to determine if the phone was on and in use—a USER.PRESENT receiver—was key to instructing the host apps to call for ads to be shown out-of-context or hidden from the user’s actual view.

The threat actors behind Poseidon didn’t cover their tracks very well, though, as all of the code they built into the apps to handle the fraud was out in the open. Once the Satori team reverse-engineered the code segments named for Greek mythological figures—hence, “Poseidon”—the fraud tactics were entirely laid bare. There was no real attempt to obscure the intention of the code. That would change in future iterations of the scheme.

Poseidon, the father; Charybdis, the daughter

Following the original Poseidon attack, which we worked closely with Google’s Play Store team to halt, the Satori team kept an eye on the threat actors to see how they would respond.

This phase of fraud-fighting, the adaptation phase, is a crucial part of changing the economics of cybercrime. Every fraud scheme is a race against time for a threat actor: the fraudsters only have until their scheme is shut down to reap enough profit to recoup their cost of developing and deploying it in the first place. The more that organizations can work together and share information, the more threat-hunters like Satori can discover these fraud schemes and shrink the criminal’s profit window. Eventually, the cycle of operation discovery and dismantling becomes so short that fraudsters won’t have enough time to recoup even their costs, so they’ll move on to another target.

In the later part of 2020 and early into 2021, the Satori team uncovered the second wave of this threat actor’s scheme. This iteration, which we’ve dubbed Charybdis (named for Poseidon’s daughter), evolved from the Poseidon operation in two key areas:

  1. Code Obfuscation: The threat actors leveraged a popular developer tool named Allatori, which swaps out elements of code for single letters or numbers, making it very difficult for someone to look at the raw code of an app to understand what exactly it’s supposed to do. There are many legitimate uses for tools like Allatori—much like there are legitimate ways to use many receivers—for example, the developer of a popular app might want to slow down the development of knockoff apps that eat into download numbers and sales. But—much like the case with the use of receivers—the intent is what’s most important. In the case of Charybdis and Scylla, the fraudsters use Allatori to hide the code committing the fraud inside the host apps.
  2. SDK Targeting: The original Poseidon scheme did not target any specific advertising platform via the code buried inside the host apps. With Charybdis, however, Satori researchers were able to reverse the obfuscated code and discovered targeting of specific well known advertising platforms and systems.


Poseidon, the father; Charybdis, the daughter; Scylla, the granddaughter

HUMAN’s Satori team has uncovered a collection of 75+ apps on Google’s Play Store and 10+ apps on Apple’s App Store that contained obfuscated code similar to Charybdis. This third and latest phase of the operation is named for Scylla, Poseidon’s granddaughter and a sea monster like Charybdis. These apps, when installed, commit several different flavors of advertising fraud:

  • App and Bundle ID Spoofing: this is when an app contains code that tells advertisers and ad tech companies that it’s a different app entirely, with the intent of tricking those companies into placing ads there (if it’s pretending to be an especially popular app) or into spending more money to place ads (if it’s pretending to be something else entirely, like a streaming service).

    The Scylla apps contained code that pretended to be other, legitimate games for advertising purposes, helping to keep their operation quiet.
  • Out of Context (OOC) and Hidden Ads: this is when ads are shown in a situation where ads should not be shown, or are rendered in a way that a user cannot possibly see them. For example, if your phone randomly displays an ad on your home screen, that’s an out of context ad that a bad app is prompting. Alternatively, sometimes, apps will try and sneak extra ads in but not show them to a user. The ads still count as having been “viewed” with the fraudulent code faking viewability metrics, which means the fraudster makes money, but no ad was actually visible.

    In the case of Scylla, the Receiver code (described above) would trigger when the apps weren’t open. For example, triggering when a device was simply unlocked on the home screen.
  • Fake Clicks: Every advertiser knows that clicks are more valuable than impressions. And many advertising programs are set up to bill that difference accordingly. So, naturally, fraudsters are eager to develop ways to make it look like the ads being shown are also being clicked; they make more money as a result.

    Code within the Scylla apps is built to take information from real clicks—like the timing of a real person’s click of an ad and where on the ad they clicked it—and then send that information again as a fake click to cash in.

Also new in the Scylla attack is the expansion from targeting advertising SDKs focused on Android apps into targeting iOS apps as well:

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-17-97-PM7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-14-70-PM7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-16-57-PM
Wood Sculptor, an iOS app associated with Scylla
Source: Satori Threat Intelligence and Research Team

Above, you can see a game called Wood Sculptor. The app is a knock-off of a popular game in which the user slices a path on a flat surface to allow a predetermined shape to pass through the resulting opening. Satori researchers who downloaded Wood Sculptor never saw any ads displayed during the game’s operation.

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-14-41-PM
Packet capture from Wood Sculptor
Source: Satori Threat Intelligence and Research Team

Above, a packet capture of activity from Wood Sculptor. Note the numerous calls to ad servers. Below, execution traces show additional web views where the ads called above are rendered invisible to the user.

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-16-24-PM
UI elements identifying the location of webviews for ads rendered through Wood Sculptor
Source: Satori Threat Intelligence and Research Team

How Scylla Worked


Spoofing

Many of the operations that our Satori team has uncovered use app or bundle ID spoofing as a primary fraud mechanism. Our PARETO investigation, for example, uncovered 29 Android apps that were pretending to be more than 6,000 CTV-based apps, which generally carry higher prices for advertisers than the average mobile game.

In layman’s terms, the threat actors code their apps to pretend to be other apps for advertising purposes, often because the app they’re pretending to be is worth more to an advertiser than the app would be by itself. They do this by inserting a different “bundle ID” or “app ID” (think driver’s license) in the code. Additionally, since some ad verification platforms can catch tactics like these by looking for frequently-faked bundle IDs, the threat actors will cycle through these IDs to avoid getting caught.

The apps in the Scylla operation are instructed which bundle ID to use by a remote command-and-control (C2) server, which tells the app which bundle ID to dynamically insert in the code for that specific impression opportunity, all in a matter of milliseconds.

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-17-51-PM
BundleId spoofing within Scylla
Source: Satori Threat Intelligence and Research Team

The above screenshot is taken from a game called “Lady Run”. The bundle ID, however, names a different app entirely, a game called “War in Painting”.

C2-1

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-15-70-PM
Response from C2 server with spoofing instructions
Source: Satori Threat Intelligence and Research Team

Here is a decrypted snippet of the C2 server’s response. The app, in this case, is being told to mimic the app ID of a game called Balloon Shooter.

OOC/Hidden Ads

Many mobile apps show an ad as part of their loading screen - it’s a common enough mechanism that most of us wouldn’t think twice about seeing an ad when opening an app.

What’s not common, however, is for the app to tell advertising platforms that it has displayed an ad to the user without having ever actually done so.


Loading a Scylla-associated app
Source: Satori Threat Intelligence and Research Team

The above gif seems straightforward - a game is opened, there’s a brief loading screen, and then the game is ready to play. However, what the phone user does not see is that multiple virtual screens (aka “webviews”) are launched in a way hidden from the user. These webviews are loaded with ads, tricking advertisers into paying for fake impressions to an audience that is never there.

WV1
WebView of traffic of the Scylla-associated app
Source: Satori Threat Intelligence and Research Team

As you can see in the above log, several windows rendered…but not where the user could see them. Here is a sample of the actual ads which were “loaded” to the off screen WebViews:

Source: Satori Threat Intelligence and Research Team

Fake Clicks Using Receiver Code

Earlier in this post, we described the purpose of Receivers within apps: they’re helpful in determining when a device is being actively used (or not) and when a device is well-suited for an ad to run (or not). Scylla’s designers abuse these device functions to find the ideal times to “serve” ads when they won't actually be seen. To fully understand how they accomplished this, we have to start with the JobScheduler.


View of JobScheduler within a Scylla-associated app
Source: Satori Threat Intelligence and Research Team

JobScheduler schedules a job for Android apps or devices, as the name might suggest. In the Scylla operation, JobScheduler tells the app to run certain activities (like ads) when the correct conditions are met. To figure out if those conditions are met, the apps use Receivers.

7-22 Charybdis and Scylla Blog Post for Key Customer Review-3
JobScheduler triggering on on/off/user_present within a Scylla-associated app
Source: Satori Threat Intelligence and Research Team

Above, receivers determine if a device’s screen is on or off and whether the device is actively in use. These determinations feed into the apps’ logic about when and where to show ads.

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-15-11-PM
Listeners triggering a call to the C2 server
Source: Satori Threat Intelligence and Research Team

Much of what you see above is common to what the Satori team witnessed in the Poseidon operation. What’s new in Scylla is how the apps fake actual clicks of the ads in question. Fake clicks can have multiple benefits for the fraudster: for ad networks that bill on a views model, clicks demonstrate effectiveness, which makes advertisers want to stick around. But some other ad networks bill by the click, which incentivizes the fraudster to just fake the clicks to get paid.

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-15-42-PM

7-22 Charybdis and Scylla Blog Post for Key Customer Review-Sep-22-2022-03-28-18-67-PM
Code within Scylla-associated apps log click locations and save them to later fake clicks
Source: Satori Threat Intelligence and Research Team

Above, the host apps track where real clicks happen on the device and store that information to later fake clicks.

But wait, there’s more.


Obfuscation

As noted above, one of the other key differences between the original Poseidon operation and the latest Scylla operation is how well the threat actors manage to cover their tracks. Many of the screenshots above may be difficult to parse for the average observer because bits of the code have been “renamed” in an effort to make it harder for security researchers like our Satori team to reverse engineer.

Boot1

Above, code from the original Poseidon attack stage with an unobfuscated command. Below, a Scylla app with the same command, now obfuscated with Allatori.
Source: Satori Threat Intelligence and Research Team

Boot2

Additionally, the bad actors behind Scylla used an unpaid, demo version of Allatori:


Example of use of Allatori code obfuscation tool, deobfuscated for investigation purposes.
Source: Satori Threat Intelligence and Research Team

Navigating Charybdis and Scylla

HUMAN’s Satori team has worked closely with the Google Play Store and Apple App Store to ensure that all of the apps we’ve identified as being a part of the Scylla operation have been removed from public access. We’ve also worked closely with advertising SDK developers to mitigate the impact of the operation to their processes and their advertising partners. Our researchers will continue to monitor the threat actors behind the Poseidon, Charybdis, and Scylla operations for further adaptation.

Customers of HUMAN’s MediaGuard solution are protected from fraud perpetrated by the Scylla operators.

Next Steps

HUMAN and the Satori team recommend the following:

For the public:

  • If you have any of the apps listed in the below Indicators of Compromise section on your devices, remove them. Even though HUMAN is monitoring the threat actors, they may update the apps to change how they work, so removing the apps is your best bet.
  • Consider reducing your risk of running dangerous apps by considering the source of the application and the trustworthiness of the brands involved. Secondary marketplaces, side-loaded or “cracked” applications may be much higher risk.


For HUMAN clients:

  • MediaGuard helps protect you from the impacts of Scylla-related fraud. Please contact your account manager with any questions about the impacts of Scylla to your organization.


For application developers:

  • The app-ads.txt initiative (PDF), spearheaded by the IAB Tech Lab, is a key step in protecting you and your applications’ reputations from fraud through spoofing appIDs.


For advertisers:

  • Ensure you work closely with supply-side partners whose SDKs follow the OMID protocol for identifying ad-serving apps.


Indicators of Compromise

The below is a list of all of the apps associated with each of the Poseidon family of operations.

Scylla:

OS

sha256 hash

Name

Package

Est. installs

iOS

n/a

Loot the Castle

com.loot.rcastle.fight.battle (id1602634568)

n/a

iOS

n/a

Run Bridge

com.run.bridge.race (id1584737005)

n/a

iOS

n/a

Shinning Gun

com.shinning.gun.ios (id1588037078)

n/a

iOS

n/a

Racing Legend 3D

com.racing.legend.like (id1589579456)

n/a

iOS

n/a

Rope Runner

com.rope.runner.family (id1614987707)

n/a

iOS

n/a

Wood Sculptor

com.wood.sculptor.cutter (id1603211466)

n/a

iOS

n/a

Fire-Wall

com.fire.wall.poptit (id1540542924)

n/a

iOS

n/a

Ninja Critical Hit

wger.ninjacriticalhit.ios (id1514055403)

n/a

iOS

n/a

n/a

com.TonyRuns.game (n/a)

n/a

Android

a7fea60c806d2dd10482cd630834373e49b4d944aa19d47091b3bd0a9d7890be

Super Hero-Save the world!

com.asuper.man.playmilk

1000000

Android

f90565a625044883ec9ce6323e813420412cf5c11e5f48f111dec4e1664cd176

Arrow Coins

com.arrow.coins.funny

500000

Android

94d10d5839343072aa41bdd61259b580e567e621818686559dffe888dd9337eb

Parking Master

com.ekfnv.docjfltc.parking.master

500000

Android

d43ee224e32e7d5d4ab901810afd7148cbf20ad57b07dc193cd154078ce433bb

Lady Run

com.lady.dress.run.sexylady

100000

Android

0fc35fba6a708d5c6ca7da13e294cab70530c63828d9e4dbadf430e5c8f65b4b

Magic Brush 3D

com.magic.brush.gamesly

100000

Android

0efc7c822685ebdf8f4d3d7d3104a957059c432b80624e3de6602c41bc95347f

Shake Shake Sheep

com.shake.earn.sheep.causalgame

100000

Android

f0693787bffcde05fe419518621f199765ee802e00be50102c380563db678e9b

Number Combination: Colored Chips

com.yigegame.jyfsmnq.gg

100000

Android

fe1d3f3c2ed8858c0327559f66149a4f0b82b01693b296e64448dfcff9d24ae0

Jackpot Scratcher-Win Real

com.physicswingsstudio.JackpotScratchers

5,000

Android

973ffa44c550c25b9ef80e176bb64f170647fd5ee115a3d03b98c88cc9a70a16

Scratch Carnival

com.scratchers.jackpot.luckypiggy

50,000

Android

355a9622553ddbe7bcc78a2a04ce2f5c6067ac07e8f31168e76b884c2403923f

Ztime:Earn cash rewards easily

com.pocky.ztime

100000

Android

4e94ab4fddde2f3f891777d21e4859aaa68dc9366aca82e15418692afb91af36

Billionaire Scratch

com.free.tickets.scratchers.Billionaire

50,000

Android

438e097fa5796400141f6b88b430829c2e3eebda7531e2deec4cf81d0ca15404

Lucky Wings - Lotto Scratchers

com.free.scratchers.luckywings

100000

Android

420822558735922aee5efd5da2c22ffade14597e3f1d11ebf11ab12f0b3791b7

Lucky Star: Lotto Scratch

com.free.tickets.scratchers.LuckyLotto

50,000

Android

3b1210ec0bd143b3131a04ac23f7d00fa6c1639a4679f2ebd694132145ce65f2

Shake Shake Pig

com.ldle.merge.free.coinspiggy

100000

Android

6ad0de5604b1f787908fc277780b4d45dbcbfcdd98304b1f4ecf61c12e0fcc95

Lucky Money Tree

com.ldle.merge.lucky.moneytree

100000

Android

0a201d6da8e7a1b167bda949634d00d389dc995776bad398d0272c27cf85e710

Run And Dance

com.tap.run.and.dance

100000

Android

539556f6ec50a7be633a1b5c3e30f01ba6520d6c28b1c6a57418636118e7677c

Lucky Scratchers: Lotto Card

com.lotto.bingo.lucky.scratchcard

1000

Android

54c76607362e52798ae7535e8f7ead83474ecb49944e4bfc3f29537eb2e4a40c

Pull Worm

com.pull.bugs.worm

10000

Android

ca0518bb9e77c498a222fdd0d99afc4b56eaa7ed2cf7953711d2a5872cf4e689

Crowd Battle:Fight the bad guys

com.crowd.battle.goamy

5000

Android

ec47369e7557b695784ae4b7bb419cf6d2a4978b53d94f83b3ff50b0f24138db

Shoot Dummy - Win Rewards & Paypal Cash

com.shoot.dummy.fast.speed.linger

10000

Android

4e9fd0291f921711fb19dd21d941a324c72cb77a23a9111c631304d192cea1ca

Spot 10 Differences

com.different.ten.spotgames

1000000

Android

2a4934fdb93b410d838f9b70f1d9a0b6a144016a5670cbf3b5df070273ff671f

Find 5 Differences - New

com.find.five.subtle.differences.spot.new

1000000

Android

3d67493bfd6eeadffef1d31f0eda3cb2ce11876f5a6458456322d536a0c9e7ff

Dinosaur Legend

com.huluwagames.dinosaur.legend.play

1000000

Android

8089bd929512552664daf8f28bee643bb88fbf3ceadc60d0faa439072473f804

One Line Drawing

com.one.line.drawing.stroke.yuxi

1000000

Android

27d7f05cc02bcfe7b1d5e746c5025b7bffe2534086ca4f0c04336c2d12891283

Shoot Master

com.shooter.master.bullet.puzzle.huahong

1000000

Android

4d1ccfa348c6c20b0291ac3ec2dacca47ed89b14f9d4b8ccde683f368494dc9f

Talent Trap - NEW

com.talent.trap.stop.all

1000000

Android

b6399d21f7a72f1b0bbc73864c9c228c5a4b8f6331aa5133d56589439f9747e7

Shoot it: Using Gun

com.bullet.shoot.fight.gtommm.tom

500000

Android

d6fc218b1ca0eff4e2ee65dcd2a2b173192d9c0617de5134a150bbf6972e195c

Super Flake

com.chop.slice.flake2020

500000

Android

0695f9028b1a6038ece961b494971f6762b403952c37b7f95e66112d8fc8027b

Five-Star Slice

com.five.star.slice

500000

Android

1cea4435ead7d166e509f3cc9c9a556383822ca98ee3fdfd48c4c9d683f833d3

Sand Drawing

com.sand.drawing.newfight

500000

Android

21c77771d23805593ff3f637245992376d7dce6fc18de4862973b94c184aa91c

Mr Dinosaur: Play your Dino

com.topggame.facego.finger.crazy.dino

500000

Android

abb3ae69fe1f6cf35b54508025c8a6734fe35ded22a6d42bcbcc65aa75bddb3b

Track Sliding New

com.track3d.sliding.new

500000

Android

08aeda329f3e0807625f228db30001ef83ff48fa82962bc50f84f8904a20dafb

Beat Kicker New

com.beat.kicker.two.game

100000

Android

d51080d79668b6d4036a7e5ece86389f7f12305b8ca2c379559b764455406180

Fill Color 3D

com.cube.fill.color.paint.turn.fei

100000

Android

8d5f8dd171fff8dd838871a519ae243c5bb4beeaf904cd365b97a05506aefb8a

Draw Live

com.draw.live.milipop

100000

Android

7bc9e4ebf7ea018d87ac1fb47bdebe3dcf94dd02d0d8fefef902c22166d33493

Draw 1 Stroke

com.draw.one.line.stroke.xipi

100000

Android

53739fa52192f8493da4a0067ec27c753a017941325f913508a8c8c840b534d9

Fidget Cubes

com.fidget.cubes.feel.like

100000

Android

4cb13dbb442a0b2c657e5c79a60e856f86e18ee425896b996b9a6452519aca2c

Girls Fight

com.girls.fight.fly

100000

Android

ee99a02f917a083348984b29bbfec81ec545bc16d401b391c923db14d546e353

Ninja Assassin

com.knifeninja.assassin.dltc

100000

Android

69aff645ee74bb7fa0ec4c142a7c5b07fda768742051a05d41ecb5ac456d5d28

Shooting Puzzle 2020

com.my.bullet.shooting.man.hunter.youxi

100000

Android

1a23244555d1dbd9ead7019ed07dc6af157e0321e24182c53329be5d734a49ca

Pulley Parkour

com.pul.parkour.bbroller

100000

Android

18ad35cadd4a4a15a40a85ef577645b0ff70199b11b25732e94b403f0063bf23

Chop Flake 3D

com.slice.chop.superslice3d

100000

Android

e8d7baecb47b3a671c99cb0be21cb6b9e3ca4513cff6f02e51ac9d417d88b73b

Weapon Fantasy

com.weapon.fantasy.games

100000

Android

90857e546fc916b77b1c307ad5a8c19ab213bdadd201350d4c7e6a418bde489f

Balloon Shooter

com.balloon.shooter.play

50000

Android

62272f387631a5dc4b5561ad892170f94cb1ebf804a0c863929dae76084e9529

Musical Shoot

com.ltcmusical.fun2021

50000

Android

f0d976fd5061ca5e5a8982a7f7cfafe472f6570a7de7f752501260599034c744

Chop Slices

com.lvdiao.chop.slices.chef

50000

Android

c5c51f40f5bf4e63795cffd5d2e21ee64c1a586c00249a84ad315b2c7ea30acc

Ninja Slice

com.slice.masked.games

50000

Android

c3db0ee64786b4aec5d61c3a993ab25fab2c04d2691ddfe4aae2e0fc87d4952f

Work Now!

com.work.now.slack

50000

Android

c4a7057b987ce0daf8e355e801b2ab9386a72eaa80d3592dadfd4c55e5997304

Bottle Jump

com.bottle.jump.flip.challenge.fun

10000

Android

2b109f567bcd83ab6548add5bbad392f0e5b4e7d3eeedd1363c46bdcc95d8ed3

Corn Scraper

com.corn.scraper.cut.pipe.siling

10000

Android

b9c94a1c06e671600fd4d9dbfc2a7852a3786d10394afbfb477f1b6df7c74952

Idle Wood Maker

com.idle.wood.maker.gametwo

10000

Android

1a667ba74f9ec4b0d1d36408d8af1ff2493156960134178ff84f4a4d36837c15

Pop Girls Schooler

com.pop.girls.schooler

10000

Android

2ce1c4dc30313facbdec12030cbd3a94dbc66dbfd2feab7bb231a3bb847b7a86

Romy Rush

com.romy.rushrun

10000

Android

ccecf8310b7d300abe7ff808df4198ed4d0c9e734aaf8c95413d6a67abc4290c

Spear Hero

com.spear.super.man.hero

10000

Android

33472b314c5beb8a0927522e9adf74e38b92ec5638f10d58457072177b926fb1

Dig Road Balls

com.dig.road.balls.play.games.ygygame

5000

Android

97ed09697b85cf1d58aebc4d8f306c19beff1b949b80682c414f33d902521778

BOO Popstar

com.boostar.boo.popstar

1000

Android

6687bdee0ecfec779f660327832d17739d95a4dd06536bbb387bd1175d5eb65c

Draw CompleteA

com.darwa.completea.ltca

1000

Android

2f949069c0951b7d8203d17d401e0ad5b42e7bb3c0b8c56b4ac5383c3a21c336

Rush 2048:3D Shoot Cubes

com.rushcube.puzzle.block

100

Android

6c00ad91e11ded8b006372d95ab40f0d0769a2fbaaf21909b42bfad147fe74df

Meet Camera

com.magicvcam.hdmeet.cam008

0

Android

f7f55f024a5c3e5b18cde924ce25f72aab4523a148c24f0d9eea5d2581caa470

Auto Stamp Camera

com.stac.amper.qweaf

100+

Android

028dfbf91b3b54425ddb6445e2ec3ed01e1f5f736c6821447b67816148a3f6fe

n/a

com.find.five.differences.lvye.xsl

 

Android

d45b38198005b9de44994347e9d40ad822abaa969c3a53ec63cc31adcfb9772d

n/a

com.mufc.zwxfb

 

Android

67971ff706a897fdca3487bc5782a3813a3d3d2b4261524cc214f1f5b6ffdf27

Roll Turn

com.roll.turn.song.wusi.pt

1m+

Android

572cc347cbcdbcf0f09470d22215f6791512ca0e74434e357c967e7515d9c2f8

Hiding Draw

com.hiding.drawltc.games

5k+

Android

fe8761e1be482bcea96d0edad74af19c6ce6ad85fe88178ff8343f0df61a1ccc

Peter Shoot

com.ltc.peter.shoot.tslgame

100k+

Android

e0c1774a83eda1420d5798a231592afdb8844ae7c0a2614142290d384327df63

Design n Road

com.ltcdesign.nroad

1k+

Android

5773e83f37ba16600f3e71bc5956d56be3a6c013e95f1c216bbf41eb8acf9be5

Draw Complete

com.ltcdraw.complete.fly

10k+

Android

0f1216681cca2781e73b50fbeb96bbe55a483aef79f2f5109e5776067a645fa4

Thief King

com.ltcking.thief.game.tsl

100k+

Android

96c35c5887b4a11a11590e9bba39771098ad83946eb0387cc52391b808191aaa

Downhill Race

com.downhill.race.redbull

5k+

Android

3c82a1c3fa04bbd4cb8b77f1ee5fe905b4a94d2e63f80a5ae19ecd71e9d0e920

Draw a War

com.draw.war.army

10k+

Android

b18072fb8f54e020e028cdd10fb5304ab55328c90c599fc2528d3e2b2713ccf8

Rescue Master

com.rescue.master.gear.mechanics.wushi

1k+

Android

e16dbfa2f712f8ccf36c07c5015142e0d63db0aec12d6efe656ce83ae285b8da

Spin:Letter Roll

come.letter.roll.race

100k+

Android

a65f2902fd3c067432804fd03b2c24de85af88a1f22596a1a3da65eb26cb716d

Helicopter Attack - NEW

com.helicopter.attack.shoot.sanba

500k+

Android

d40968b523ee99a78d752711e677bafa5a872f17d963640a4fac9418cca50ceb

Crush Car

com.crush.car.fly.delivery.lingjiu

1m+

Android

577f0644f9cd0849e51a6f5c0dadd7bafcc11b29b6353d97ffa039f3835747a6

Relx cash

com.tycmrelx.cash         

100k+

Android

ec41dce767a5f49bbe1191f127f2f2c5a6a6345650b51a53795e273504062674

War in Painting

com.painting.war.inpaper  

100+

Android

17aa73a2c3967efd6b11b8c59cf51fcab839169b2281c7f435b2cca5e8ab1ab5

Bike Extreme Racing

com.bike.extreme.raceing.bikegames

50k+

Android

576e5381142a2fe7fa8279d2a8d7fd4123adb7ae885029dca1bc5050ada2da0b

Player Spiral Maker 3D

com.player.spiral.maker.d3

50k+

Android

6d6a8f797415a26f51e1a5ba1de7c75cddd3b5a5a5c5148590355bf62f84b0be

Match 3 Tiles

com.blocks.tile.matching

10k+

Android

f9932711ca68d431824fa1557a333176e97faf529b1edde6bd7c0e8e2b614114

2048 Merge Cube - Win Cash

com.cube.merge.shooter

10k+

Charybdis:

App Name

App ID

Installs reported by Google’s Play Store

[unknown]

com.car.jumpygy.race

0

[unknown]

com.droiand.killer.assassin.fun

0

[unknown]

com.ocean.fire.uabfire

0

[unknown]

com.pips.connect.uabking

0

[unknown]

com.recharge.go.run

0

[unknown]

com.Sign.Maker.cut.paint

0

Lucky Now! Scratch, Spin, Play Lottery & Win Money

com.lucky.scratch.spin.us

1,000,000

Lark - Work, Together

com.larksuite.suite

500,000

Assassin Legend - 2020 NEW

com.assassin.knife.legend.wuheng

100,000

Find the Differences - Puzzle Game

com.find.five.differences.picture.houpu

100,000

Wood Carving - NEW

com.wood.carving.cut.erqi

50,000

Idle Edo: Simulation of City Builder, Tycoon Games

com.edotime.picturescroll

1,000

Fresh Camera

com.cam.air.crush

1,000,000

Crush Car

com.crush.car.fly.delivery.lingjiu

1,000,000

Draw Color By Number

com.draw.color.number.paint.lvye

1,000,000

Happy Color By Number - New

com.happy.color.number.paint.hang.new

1,000,000

Stack Block Crusher

com.ygygame.stack.block.crusher

1,000,000

Disc Sport

com.disc.sports.battle.fly.yewai

500,000

Fire In The Desert

com.fire.the.desert.in

500,000

Running Dinosaur

com.games.mili.running.dinosaur.funny

500,000

Helicopter Attack - NEW

com.helicopter.attack.shoot.sanba

500,000

Help Me Down Game

com.help.me.game.puzzle.waocmangames

500,000

Rolling Scroll

com.rollscroll.rollingsc

500,000

Rugby Pass

com.rugby.pass.listgame

500,000

Color By Number

com.color.number.book.art.sanba

100,000

Find Hidden

com.find.hidden.objects.ltcltc

100,000

Flying Skateboard

com.flying.skate.rolling

100,000

Iron It

com.iron.clothes.smooth.perfect

100,000

Jump Jump

com.jump.ltcjump.game

100,000

Love Saver

com.make.love.saver.pop

100,000

Plant Monster

com.plant.eat.grow.monster.wuba

100,000

Sway Man

com.sway.man.escape.tumbler

100,000

Peter Shoot

com.ltc.peter.shoot.tslgame

50,000

Shooting Run

com.shoot.ing.rungame.ltcpp

50,000

Circuit Master

com.cir.cuit.master.likeapp

10,000

Desert Against

com.desert.against.ygygy.game

10,000

Balls Out Pazzle: Puzzle Maze Game

com.games.balls.out.puzzle.funny

10,000

Stacking Jump - Make Human Ladders

com.ladder.tower.stacking.jump.wuxiang

10,000

Musical Shoot

com.musicalltc.shoot.game

10,000

Bungee Jumper

com.bungee.jumper.gamelite

5,000

Rugby Master

com.master.rugby.discogame

5,000

หวยสามารถเบ็ต SamartBet ยี่กี เกมส์ บาคา กีฬา

com.orghonoka.misamart

5,000

Magic and Throne

com.ylyy.magicandthrone

5,000

Draw & Puzzle

com.brain.guess.draw.puzzle.something

1,000

Color the Pictures

com.color.pictures.paint.number.yiliu

1,000

Crush King

com.crush.king.jump.truck.siliu

1,000

Happy Mouse!

com.happy.mice

1,000

King of Thieves

com.king.of.thief.easier

1,000

Magic Brain

com.magic.brain.think.solvelogic

1,000

Props Rescue

com.props.rescue.girl

1,000

Find All

com.find.all.out.different

1

House Maker

com.bet.house.maker

0

Helicopter Attack

com.helicopter.attack.gun.rescue.liuliu

0

Poseidon:

com.magicvcam.beauty.yoobao.camera

com.onestoke.games.www.puzzlegame

com.time.date.stamp.camera.xixifunction

art.eff.filter.photo.editor

com.jelly.crush.europam.games

com.tools.blur.master.editor

com.mirth.cam.pic

com.mobwontools.pixel.blur.editor

com.blurcam.pro.usefultools

com.magicvcam.tool.beauty.camera

com.mobwontools.pixel.blur.cam

com.camera999.super.photo.editor

com.jelly.bubble.game.pop

com.pic.photo.editor.eraser

com.music.play.hi.cloud

com.puzzle.ygyline.onestroke

com.puzzle.lines1.drawstroke

com.video.nin.cut.face

com.camera.ygysuper.photograph

com.magicvcam.hdmeet.cam008

com.box.checkers.chess.free

com.super.photo.ygy.camera

com.magicvcam.meet.photograph

com.funny.camera.top

com.soon.ygy.photograph.camera

com.video.master.face.fb

com.magicvcam.camera.meet

com.camera.easy.photo.beauty

com.magicvcam.camera.newmeet

com.magicvcam.ygycronus.camera.magic

com.cos.ygy.camera.new

com.jelly.cube.crush.colors

com.photoeditor.background.change

com.connect.dots.maker.drawonelin

com.blur.oceans.flyin

com.magicvcam.mine.ygycamera.magic

com.ygy.find.spot.the.difference

com.candy.crushfunny.toystoys

com.frog.crushtoy.blast

com.magicvcam.ygycamera.magic.tool

com.toy.blast.cube.crush.toysfun

com.magicvcam.photos.ygy.tool.magic