Satori Threat Intelligence and Research Team
Threat intelligence the HUMAN way.
Our Satori team discovers, analyzes, and disrupts threats throughout the digital landscape resulting in actionable insights and collaborative takedowns of cybercrime.


The heart of HUMAN is protecting the digital experience—and at the core of this mission is the Satori Threat Intelligence Team. Satori is the DNA woven into everything we do, acting as a collective force multiplier of collaboration. Their work empowers everyone in the HUMAN ecosystem, delivering comprehensive insights throughout the customer journey, and benefits that strengthen our unified HUMAN Defense Platform.
Their work empowers everyone in the HUMAN ecosystem, delivering comprehensive insights throughout the customer journey, and benefits that strengthen our unified HUMAN Defense Platform.
Threat Intelligence the HUMAN Way
-
BADBOX 2.0
1 million+
BADBOX 2.0 infected more than 1 million devices worldwide.
750 Million
At peak, BADBOX 2.0-infected devices accounted for 750 million fraudulent bid requests a day.
24
Decoy apps in major app marketplaces enabling fraud through off-market apps across the internet.
-
Phish ‘n’ Ships
10 Million
10s of millions in monetary loss for businesses and customers. Dozens of store fronts all taken down by HUMAN partners.
1,000+
Over 1,000 web pages have been infected, driving traffic to fake web shops by injecting malicious payloads into legitimate websites.
200+
200+ fake web shops that abuse digital payment providers to steal consumers’ money and credit card information; 121 active during our investigation.
-
Konfeti
10 Billion
At peak, the malicious apps generated 10 BILLION fraudulent ad requests per day.
10 Decoy “Evil Twin” Apps
Satori researchers identified more than 250 app pairs abusing the CaramelAds advertising SDK across the internet.
700 url+
Researchers gained a broader understanding of the threat’s scope from a collection of IOCs, which included over 700 URLs, likely featuring compromised free content uploaded to platforms.
-
Badbox
280,000
280,000 unique devices were impacted through ad fraud scheme.
74,000+
Over 74,000 off-brand Android devices showed signs of BADBOX infection.
227
The ad fraud botnet’s conglomerate of associated apps were found in 227 countries and territories.
-
VASTFLUX
12 Billion
12 billion fraudulent ad requests in one day.
11 Million
11 million devices running ads within apps.
1,700+
More than 1,700 apps were spoofed across platforms.
-
Scylla
13M+
Associated apps were downloaded 13+ million times.
80+
80 Android apps on the Google Play Store and 9 apps on the Apple App Store were affected.
Full
Takedownwas orchestrated in collaboration with Google and Apple.
-
Methbot
300 Million
At its zenith, the Methbot operation
was “watching” 300 million video ads
a day. And as video advertising carries
a significantly higher cost than traditional banner or social ads, this adds up fast.6,000
More than 6,000 premium publishers were spoofed in this operation.
10
The ringleader of the Methbot scheme was recently sentenced to 10 years in prison and restitution fines of more than $3.5 million.
-
3ve
700,000
The 3ve botnet had
more than 700,000
active infections at a time during its operation.3 billion
More than 3 billion ad requests every day were attributable to the 3ve botnet.
20+
The industry group built to disrupt—and take down—the 3ve botnet and scheme was composed of more than 20 organizations, including Google, Facebook, Amazon, and the FBI.
-
ICEBUCKET
28%
At its height, the ICEBUCKET scheme accounted for 28% of all connected TV traffic passing through the Human Verification Engine.
1.9 Billion
Nearly two billion pre-bid ad requests were associated with the ICEBUCKET operation every day before its disruption.
2 million
More than two million people in 30 countries were spoofed or faked during ICEBUCKET.
-
PARETO
6,000
The PARETO operators spoofed more than 6,000 CTV apps as part of their scheme.
1 Million
PARETO operated chiefly through a botnet of nearly one million infected Android phones.
650 Million
Across its mobile and CTV-centric botnet, the PARETO operation made more than 650 million fraudulent bid requests a day.