{"id":12818,"date":"2026-01-15T07:55:47","date_gmt":"2026-01-15T15:55:47","guid":{"rendered":"https:\/\/www.infoblox.com\/blog\/?p=12818"},"modified":"2026-01-16T00:43:25","modified_gmt":"2026-01-16T08:43:25","slug":"inside-a-malicious-push-network-what-57m-logs-taught-us","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/","title":{"rendered":"Inside a Malicious Push Network: What 57M Logs Taught Us"},"content":{"rendered":"<p>Who doesn\u2019t love to eavesdrop onto a juicy conversation? We recently snooped on the communications of an affiliate advertising push notification system whose DNS records were left misconfigured&#8211;oops. This mistake allowed us to receive a copy of every ad they sent victims, along with all the metrics they recorded. We analyzed over 57M logs collected over a two-week period that contained advertisements, requests for software upgrades, and other events. It\u2019ll come as no shock to our regular readers that we observed widespread deceptive practices, scam activity, and brand impersonation throughout the data.<\/p>\n<p>As interesting as the data was, the method we employed was even more fun. We used a DNS technique to take control of a domain abandoned by the threat actor by simply claiming it at the DNS provider. For the DNS geeks out there: we took advantage of a lame name server delegation. We warned about this technique last year, which we dubbed <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/who-knew-domain-hijacking-is-so-easy\/\"><strong>Sitting Ducks<\/strong><\/a> attacks, in joint research with <a href=\"https:\/\/eclypsium.com\/\" target=\"_blank\"><strong>Eclypsium<\/strong><\/a>. As soon as we realized that the actor had neglected one of their DNS records, we immediately called Eclypsium again.<\/p>\n<p>Within an hour, we had claimed the domain at the DNS provider, and our server was flooded with requests from victim devices, sending detailed information about their device and more! This wasn\u2019t an adversary in the middle (AiTM) operation; we had a seat \u201con the side\u201d of the threat actor\u2019s operations. Every message from the notification server to every victim was also sent to us. See Figure 1.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-1.jpg\" alt=\"Figure 1\" \/><\/p>\n<p class=\"image-caption\">Figure 1. How push notifications work according to <a href=\"https:\/\/felixgerschau.com\/web-push-notifications-tutorial\/\" target=\"_blank\"><strong>https:\/\/felixgerschau.com\/web-push-notifications-tutorial\/<\/strong><\/a><\/p>\n<p>But why listen to just one conversation when you can listen to many? It turns out this actor demonstrated poor DNS hygiene, including multiple misconfigured delegations. Within a day, we\u2019d increased our collection from one domain to nearly 120. Thousands of victim devices were connecting to our server and creating 30MB per second of logs. While we collected traffic for a lot of domains, the actor controlled at least an order of magnitude more. This appears to be a large-scale push-notification advertising operation with a global footprint.<\/p>\n<p>Data analysis showed that while the commercial network might claim to be merely delivering \u201cadvertisements\u201d on behalf of their affiliates, based on the observed content, these notifications do not resemble legitimate advertising. Users were bombarded with messages, on average over 140 a day. The titles were in over 60 languages spanning the globe; see samples in Table 1.<\/p>\n<table>\n<thead>\n<tr>\n<th>Language<\/th>\n<th>Sample Messages<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>English<\/td>\n<td>\u201cBREAKING NOW \ud83d\udd25\u201d, \u201cYour number has been chosen!\u201d, \u201cStart winning big!\u201d<\/td>\n<\/tr>\n<tr>\n<td>French<\/td>\n<td>\u201cLE SECRET DE RETAILLEAU R\u00c9V\u00c9L\u00c9\u201d, \u201cF\u00e9licitations!\u201d, \u201cNe manquez pas cette offre!\u201d, \u201c\u274c Votre compte est bloqu\u00e9!\u201d<\/td>\n<\/tr>\n<tr>\n<td>Spanish<\/td>\n<td>\u201c\u00a1Juega con ventaja!\u201d, \u201c\u00a1Felicidades!\u201d, \u201cReg\u00edstrate y recibe!\u201d<\/td>\n<\/tr>\n<tr>\n<td>Portuguese<\/td>\n<td>\u201cConvide 1 e ganhe R$55\u201d, \u201cHoje \u00e9 seu dia de sorte!\u201d, \u201cGanhe b\u00f4nus agora!\u201d, \u201cBRADESCO: Voc\u00ea possui 42.487\u201d<\/td>\n<\/tr>\n<tr>\n<td>Arabic<\/td>\n<td>\u201c\u0627\u062e\u062a\u064a\u0627\u0631\u0643 \u0625\u0646\u062a\u201d, \u201c\u0645\u0643\u0627\u0641\u0623\u0629 \u0644\u0627\u0639\u0628\u064a\u0646 \u062c\u062f\u062f!\u201d, \u201c\u0628\u0627\u0642\u0629 \u062a\u0631\u062d\u064a\u0628\u064a\u0629 \u0636\u062e\u0645\u0629 \u0628\u0627\u0646\u062a\u0638\u0627\u0631\u0643\u201d<\/td>\n<\/tr>\n<tr>\n<td>Russian<\/td>\n<td>\u201c\u0426\u0435\u043d\u0437\u0443\u0440\u0430 \u0432\u043c\u0435\u0441\u0442\u043e \u0447\u0435\u0441\u0442\u043d\u043e\u0441\u0442\u0438!\u201d, \u201c\u041f\u043e\u0437\u0434\u0440\u0430\u0432\u043b\u044f\u0435\u043c! \u0412\u044b \u0432\u044b\u0438\u0433\u0440\u0430\u043b\u0438!\u201d, \u201c\u0411\u0430\u043b\u0430\u043d\u0441: +130 000\u20bd\u201d<\/td>\n<\/tr>\n<tr>\n<td>Polish<\/td>\n<td>\u201cPowiadomienie o wyp\u0142acie\u201d, \u201cMasz 2 spiny\u201d, \u201cRewelacyjna Platforma!\u201d<\/td>\n<\/tr>\n<tr>\n<td>Turkish<\/td>\n<td>\u201cT\u00fcrkiye\u2019ye \u00d6zel Teklif!\u201d, \u201c\u0130nan\u0131lmaz Casino Bonusu!\u201d<\/td>\n<\/tr>\n<tr>\n<td>Hebrew<\/td>\n<td>\u201c\u05d4\u05d9\u05ea\u05e8\u05d4 \u05e9\u05dc\u05da: \u20aa9281 \u2014 \u05e7\u05d1\u05dc \u05e2\u05db\u05e9\u05d9\u05d5!\u201d, \u201c\u05d5\u05d9\u05e8\u05d5\u05e1 \u05d1\u05d8\u05dc\u05e4\u05d5\u05df \u05e9\u05dc\u05da?\u201d<\/td>\n<\/tr>\n<tr>\n<td>Japanese<\/td>\n<td>\u201c\u8b66\u544a\uff1aGoogle\u30a2\u30ab\u30a6\u30f3\u30c8\uff081\uff09\u201d, \u201c\u3042\u306a\u305f\u306e\u30a2\u30f3\u30c1\u30a6\u30a4\u30eb\u30b9\u30e9\u30a4\u30bb\u30f3\u30b9\u304c\u9593\u3082\u306a\u304f\u671f\u9650\u5207\u308c\u3067\u3059\uff01\u201d<\/td>\n<\/tr>\n<tr>\n<td>Korean<\/td>\n<td>\u201c\u274c \uac10\uc5fc\ub41c \ud30c\uc77c\uc774 \uacc4\uc88c\uc5d0\uc11c \ub3c8\uc744 \ud6d4\uce60 \uc218 \uc788\uc2b5\ub2c8\ub2e4 \u274c\u201d, \u201c\ud734\ub300\ud3f0\uc5d0 \ubc14\uc774\ub7ec\uc2a4\uac00 \uc788\ub098\uc694?\u201d<\/td>\n<\/tr>\n<tr>\n<td>Vietnamese<\/td>\n<td>\u201cKhuy\u1ebfn m\u00e3i l\u1edbn cho Trader m\u1edbi!\u201d, \u201c\u0110\u0103ng k\u00fd ngay \u2013 \u01afu \u0111\u00e3i l\u1edbn!\u201d<\/td>\n<\/tr>\n<tr>\n<td>Hindi<\/td>\n<td>\u201c\u0906\u091c \u0939\u0940 \u091c\u0940\u0924\u0947\u0902 \u20b9500 \u092c\u094b\u0928\u0938!\u201d, \u201c\u0906\u092a \u0935\u093f\u091c\u0947\u0924\u093e \u0939\u0948\u0902\u201d<\/td>\n<\/tr>\n<tr>\n<td>Dutch<\/td>\n<td>\u201c\u274c Uw account kan worden GEHACKT\u201d<\/td>\n<\/tr>\n<tr>\n<td>German<\/td>\n<td>\u201cSparkasse +326,00 Euro\u201d<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"image-caption\">Table 1. Sample push notification lures in multiple languages<\/p>\n<p>We collected roughly 60GB of compressed JSON collected over 15 days, and the JSON was extremely rich. It showed the inner workings of this push network at a level never previously published. Whereas we knew from personal experience that the notifications delivered by this network were filled with deception, this data allowed us to verify our experience on a global scale. We found that:<\/p>\n<ul class=\"list-spacing\">\n<li>The notifications thematically use deception, fear, and hope to entice users to click on the link. They include impersonation of legitimate financial services like Bradesco, Sparkasse, Recibiste, MasterCard, Touch \u2018n Go, and GCash. Clickbait lures included references to scandals, politicians, and famous personalities.<\/li>\n<li>The domains we gathered served ads to Android Chrome users all over the world, but most of the notifications we saw were sent to Asia, and more specifically to South Asia. Bangladesh, India, Indonesia, and Pakistan represented 50% of all the traffic.<\/li>\n<li>The median victim would be shown 140 notifications per day, and a total of 7600 notifications over the lifetime of their subscription. Some had been subscribed for over a year to the service.<\/li>\n<li>The actor encodes a click-through-rate (CTR) estimate in each notification. The highest CTR estimated for any victim at any time is 1 in 175, but the average was 1 in 60,000!<\/li>\n<li>The data included user clicks, which confirmed these low rates. We saw 630 user clicks in 57 million events.<\/li>\n<\/ul>\n<p>To the best of our ability, we can estimate that they were making about $350 per day from these ads. Given the total set of domains under their control at the time, perhaps they were making ten times that worldwide. It\u2019s not a ton of money, but perhaps it is enough in their region of the world. After all our analysis, it feels like we know both a lot more and a lot less about the push advertising world.<\/p>\n<p>Our research reveals the underbelly of a push advertising platform engaged in deceptive practices. But it also lays bare the dangers of neglected domains. While we \u201crescued\u201d the malicious domains, other bad actors are using the same technique to grab dormant domains from legitimate organizations every day. While similar domain-hijacking techniques are used by other threat actors to distribute malware, this research did not observe malware payload delivery originating from the push-notification network described here. One of the most prevalent examples is Vacant Viper: a DNS threat actor who hijacks domains through this very same technique and then uses them for 404TDS, a malicious traffic distribution system known to deliver a variety of malware. If the abandoned domains are still actively used, the attacker can gain access to lots of sensitive information, as well.<\/p>\n<p>Technically, DNS hygiene is the responsibility of the domain owner and many people, including government officials we spoke with last summer who don\u2019t consider exploiting these vulnerabilities as attacks. It\u2019s more like someone dropped their toy on the sidewalk, and someone else picked it up. Whose fault is that? <em>But being a bit on the \u201cgoodie two-shoes&#8221; side of things, we told the DNS provider what we were doing&#8230; just in case.<\/em><\/p>\n<p><em>Note: This research intentionally avoids attributing the observed behavior to any named organization. Similar operational patterns are exhibited by multiple unrelated actors within the push-notification monetization ecosystem. Additionally, all data analyzed in this research was reviewed in aggregate. Personally identifiable information was not retained, and no attempt was made to identify individual users. As an \u201cobserver on the side\u201d of the push notification service, we passively received traffic due to a DNS misconfiguration (lame delegation) that caused requests to be sent to infrastructure under our control. We did not access the service\u2019s systems, issue commands, deliver content, or otherwise interfere with the relationship between the service and the user device.<\/em><\/p>\n<h3>The Back Story<\/h3>\n<p>Our adventure began in January 2025 when we knowingly visited a compromised website and clicked \u201callow\u201d on a prompt that popped up on the screen, subscribing to push notifications from an unknown actor. With one simple click, a custom service worker was downloaded onto our device to manage our \u201csubscription.\u201d The phone began buzzing constantly with an endless series of alerts, often more than 100 a day. The lures ranged from classic scareware to dating to shocking stories of famous people; see Figure 2 for some examples. This is the third blog in our series chronicling these experiences; our earlier blogs include <a href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/pushed-down-the-rabbit-hole\/\"><strong>Pushed down the Rabbit Hole<\/strong><\/a> and <a href=\"https:\/\/blogs.infoblox.com\/threat-intelligence\/survey-says-its-a-scam\/\"><strong>Survey Says: It\u2019s a Scam!<\/strong><\/a>.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-2a.jpg\" alt=\"Figure 2a\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-2b.jpg\" alt=\"Figure 2b\">\n<\/div>\n<p class=\"image-caption\">Figure 2. An example of the false information included in notifications received from this commercial push network.<\/p>\n<p>We suspected that a commercial affiliate advertising network was operating the subscription service but weren\u2019t sure which one. The domain names were randomly generated, registration data protected, and hosting obscured. It was clear, though, that the scale of the operation was large. Hundreds of domains were delivering the same content through the same infrastructure. When a user clicked on one of the notifications, a detailed set of data about the user, the subscription, and the lure were delivered to the push server.<\/p>\n<p>After a few months, things changed. Our device kept receiving notifications, lots of them, but clicking on them led to an error that the domain was unresolvable. At first, we thought the domain resolution was blocked through a DNS server somewhere along the way. After all, we\u2019re not the only ones in the domain blocking business.<\/p>\n<p>Why would we continue to get notifications for an unresolvable domain? It didn\u2019t make a lot of sense until we realized it wasn\u2019t the domain that was the problem: the name servers didn\u2019t recognize the domain. In DNS lingo this situation is called a lame delegation. When a domain is configured at a registrar to use external name servers, but those name servers do not have information about the domain, they are unable to answer DNS queries about it.<\/p>\n<p>In certain cases, someone who hasn\u2019t registered the domain can then go to the DNS provider and simply \u201cclaim\u201d it. Once they establish new DNS records, queries for the domain will be answered as directed by the claimant. Tada! Whatever content was sent to the domain, for example email, is now sent to the usurper. They gain complete control, usually for free, all due to a DNS misconfiguration or a forgotten domain.<\/p>\n<p>There are a lot of domains with lame delegation on the internet, so many that we felt \u201csitting ducks\u201d was the most apt way to describe this vulnerability and attack. Frequently, these sitting ducks are picked up within a few days for use in various malicious campaigns. Sadly, domain owners almost never notice, and the same domain is hijacked repeatedly for use in different attacks.<\/p>\n<p>So here we found ourselves in August 2025 with an affected device that desperately wanted to connect to a lame domain. We felt compelled to rescue it. We were expecting to see connections from affected devices but were surprised by the torrent of data we received.<\/p>\n<h3>Push Notification Services<\/h3>\n<p>Push notification services were designed so that applications, such as browsers, could deliver content to users under a subscription model, providing users with up-to-date information without having to visit the site or open the application. It\u2019s also a model frequently abused by threat actors to obtain a form of persistence on the user\u2019s device.<\/p>\n<p>For this story, we only need to know a few things: the protocols involved and the implementations. To learn more, see <a href=\"https:\/\/web.dev\/articles\/push-notifications-overview\" target=\"_blank\"><strong>this<\/strong><\/a> article and <a href=\"https:\/\/felixgerschau.com\/web-push-notifications-tutorial\/\" target=\"_blank\"><strong>this<\/strong><\/a> article.<\/p>\n<p>To establish a subscription service on a user\u2019s device, the website needs to do the following:<\/p>\n<ul class=\"list-spacing\">\n<li>Gain permission from the user to send notifications. While this is intended to be a clear choice to the user, many threat actors use deception to get permission. The prevalence of captchas, cookie warnings and other pop-ups have conditioned most of us to just click accept without reading anything. Actors use this to their advantage, disguising subscribing to notifications as just another thing you need to click through to actually get through to the website you are visiting.<\/li>\n<li>Establish the subscription with the application\u2019s push notification service, which manages the actual delivery of data to the client. While the third-party service, e.g., Google\u2019s Firebase, technically delivers the messages, they are encrypted and not visible to the push service.<\/li>\n<li>Place a service worker on the device that handles incoming messages, manages software updates, and deals with data analytics. The service worker will be automatically updated during the life of the subscription.<\/li>\n<\/ul>\n<p>When the user clicks on a browser notification, it will follow an embedded link, which may not include the original subscription domain. For example, if the user agreed to receive alerts from domain A, when clicking on one of the lures, they may instead be sent to, or quickly redirected to, domain B. This misdirection is what we showed earlier in Figure 1.<\/p>\n<p>In our case, the lame domain was used to host the service worker software and to redirect victims to scam offerings when they clicked on a notification. The notification URLs contained an automatic redirect to a fixed domain that funneled traffic into a traffic distribution system (TDS) run by the affiliate advertising network. The data we collected was a combination of requests for software updates, advertising details from the service worker, and individual user clicks on notifications. Figure 3 shows a comparison between the original push notification configuration and after we freed the domains.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-3.jpg\" alt=\"Figure 3\" \/><\/p>\n<p class=\"image-caption\">Figure 3. A comparison between normal traffic flow for the push network (the state where it was vulnerable to a Sitting Ducks domain takeover) and the state where messages are copied to the hijacker<\/p>\n<h3>Data Analysis<\/h3>\n<p>When we first took over these domains, we were unsure why they had been abandoned. After all, even with those domains being left lame, victims still receive malicious push notifications, they just can\u2019t reach the advertisement. It doesn\u2019t seem like it would be much effort for this actor to keep the operations going.<\/p>\n<p>Given that the goal of advertising is to make money, and dropping the domains meant lost opportunity to make money, we strongly suspected that they didn\u2019t mean to abandon their domains. After all, if large organizations are vulnerable to sitting duck attacks, it seems likely that a threat actor whose primary business is not cybersecurity could also carelessly leave their infrastructure vulnerable.<\/p>\n<h3>Actor Capabilities<\/h3>\n<p>To our surprise, all the tracking, all the notifications, and all the logs our new domains were receiving were in clear text. The actor did not bother to encrypt anything; the most difficult deciphering we had to do was decode a few Base64 strings.<\/p>\n<p>And that is not for a lack of things to hide! One of the main features they use to personalize ads for each victim was a simple list of keywords, which are typically used to target specific audiences. Like other affiliate advertising networks, this one offers several verticals including dating, nutra, sweepstakes, and gambling. Each time the push network sends a notification to a victim, it also includes all the information used to track victims. Each notification log contains the keywords associated with that user as one of the many parameters of a JSON object.<\/p>\n<p>We knew that a lot of the scams being advertised were linked to fake security breaches, so we assumed we would find keywords like \u201cvirus\u201d or \u201cmalware,\u201d but no&#8230; as far as we could tell, they used the keyword \u201cnews\u201d to mean anything but adult content. Every other keyword they used was sexual. We\u2019ll spare you the ones we unfortunately had to look up, but some of the more generic keywords included: adult, bisexual, dating, extreme, feet, gay, and VR.<\/p>\n<p>This threat actor also tracks a litany of things that, we assumed, would help them distribute highly targeted ads. The platform boasts about their advanced targeting, which they claim will help advertising affiliates customize incoming traffic for a high return on investment (ROI).<\/p>\n<p>When they first subscribe, the victim\u2019s device sends its information to the notification server. This data is then sent back to the victim in clear text as part of each notification they receive! Meaning that we could see this information for all the victims who sent a request to the domains we had rescued. This includes information about their OS, their phone model, their internet service provider (ISP), and the date when they first subscribed to these scam notifications.<\/p>\n<p>Each victim is assigned an SID, which we assume stands for \u201csubscriber ID.\u201d The threat actor tracks victims\u2019 behaviors, whether they close, ignore, or interact with the scam notification they have just been shown. Each victim also regularly sends requests to the actor\u2019s C2 to make sure they keep an up-to-date record of their victims\u2019 IPs<\/p>\n<p>It\u2019s said there is no honor among thieves, and there may be less among affiliate advertisers. As a result, everyone involved in the industry has some kind of fraud protection in place. The actor knows that people will try to abuse their system, so they implement various features that let them separate real victims from anyone else who is a bit too curious. The platform offers a feature that identifies IP mismatches: if a victim responds from an IP that does not match their record; an \u201cIP mismatch\u201d flag is set. They also look for User Agent string mismatches, geo location mismatches, ISP mismatches, and they track victims who click on notifications after their TTL is meant to have expired. For some reason, these fraud prevention features are not always activated, so they might charge advertisers extra to make sure their \u201cads\u201d are shown to real people.<\/p>\n<p>The final kind of metadata we could see from each notification that the victims logged was data tracking the actor\u2019s operations. They track information about each ad: the ad\u2019s \u201cpublisher,\u201d the ad\u2019s payment model, its cost, its estimated click through rate, the domain where the ad came from, and basically everything they need to track their revenue, the total number of notifications they have sent to each victim over the life of their subscription, as well as how many ads they had been shown that day. They also track information like the language of the ad, and the geolocation of their victim (Figure 4). All of this gave us great insight into their operations.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-4.jpg\" alt=\"Figure 4\" \/><\/p>\n<p class=\"image-caption\">Figure 4. Map showing the percentage of notifications pushed to victims in each country<\/p>\n<p>From looking at the location of all the victims, two things were clear to us: this threat actor has the ability to deliver scams or other malicious content to basically anyone on earth. Despite this, most of the notifications we saw were sent to Asia, and more specifically, to South Asia: Bangladesh, India, Indonesia, and Pakistan represented 50% of all the traffic we were seeing.<\/p>\n<h3>The Victims<\/h3>\n<p>As we noticed that most of the victims were from countries where advertising rates are low, a thought started crossing our mind: maybe those malicious notification servers were abandoned because they were not profitable? This isn\u2019t foreshadowing or anything&#8230;<\/p>\n<p>TDSs and advertising threat actors are always trying to hide their most malicious activity from prying eyes, and there is only so much we can do to go around their evasion techniques. So, receiving logs of real malvertising traffic was a great opportunity for us to see what real victims are experiencing, and we were not disappointed.<\/p>\n<p>We initially thought that victims were being sent many fewer ads than we were but quickly realized that we were wrong. It turns out that the actor\u2019s platform sent notifications to victims in batches of up to 20. Each notification had a delay parameter, which meant victims would get notifications at regular intervals throughout the day.<\/p>\n<p>The median victim would be shown 140 notifications per day, adding up to a total of 7600 notifications over the lifetime of their subscription, which roughly lined up with the number of notifications our threat research phone was getting. We also examined how long the scam victims would stay subscribed to the notifications. These scams are extremely obnoxious, and would make using your phone a minefield, where you could accidentally click on notifications that happen to pop up at the wrong time. Surely most victims would unsubscribe from these notifications as soon as they could. But as the graph in Figure 5 shows, based on the data as of October 2025, a non-negligible number of victims had been subscribed to these notifications for up to a year!<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-5.jpg\" alt=\"Figure 5\" \/><\/p>\n<p class=\"image-caption\">Figure 5. Number of new victims per month from October 2024 through June 2025<\/p>\n<p>We suspect these malicious ads aren&#8217;t really trying to get you to pay attention to them&#8230; they might be just try to trick you into clicking. And that kind of explains why they send hundreds of ads a day to all of their victims: The goal isn\u2019t to target ads to the people who will be the more likely to engage with them; the goal is to try to trick people, to inflate the numbers, and make it look like traffic on the advertiser&#8217;s website is increasing. With so many notifications, it is easy to accidentally click one.<\/p>\n<p>What actually happens when victims click on these notifications? We know that when threat researchers click on them, we often get shown decoy pages, but sometimes we do get redirected to really bad (easy to spot) scams through TDSs. Is that actually representative of victims&#8217; experiences? Well, it turns out that the metadata contained in each notification lets us know what victims are going to be shown if they click! It doesn\u2019t indicate what domain name someone will be sent to, but it does specify which template will be shown to the victim. Notifications can lead to a few different kinds of templates. Some have very generic names, like \u201cvideo-template\u201d or \u201cloading-template;\u201d some seem related to security, like \u201csecure-template\u201d and \u201ccaptcha-template.\u201d Most remind us that this threat actor specializes in adult content, with \u201cdating-template,\u201d \u201ctwogirls-template,\u201d \u201cwanna-fuck-template,&#8221; and many others (Figure 6).<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-6.jpg\" alt=\"Figure 6\" \/><\/p>\n<p class=\"image-caption\">Figure 6. Screenshots of the landing pages of a few &#8220;safe for work&#8221; templates<\/p>\n<p>The data showed that every ad sent to the victim requested push notification subscriptions for new sites. This is done because <a href=\"https:\/\/web.dev\/articles\/push-notifications-subscribing-a-user#regular_resubscription_to_prevent_expiration\" target=\"_blank\"><strong>browsers require users to occasionally confirm<\/strong><\/a> they want to be subscribed to push notifications. If users fail to do so, their browsers will eventually block these notifications. This may explain why we were still receiving requests to subscribe to notifications from the server we took over despite it being abandoned for days.<\/p>\n<p>One thing that was making us realize how few people were actually clicking on those ads was that this threat actor seems to be estimating the Click Through Rate (CTR) each ad might get, but their estimations are pathetically low. Which is confusing because it is a number that they are providing, both to advertisers and victims!?<\/p>\n<p>According to the actor, their highest CTR estimated for any victim at any time is 1 in 175, which wouldn\u2019t be too bad, but the average was 1 in 60,000! It gets even worse when looking at their median CTR: over half the subscribers click once for every 950,000 impressions!<\/p>\n<p>We thought that there must have been something wrong with their estimation process, so we computed the effective CTR we observed over the 15 days of logs we had, and it turns out that they were surprisingly not far off, with an effective CTR of 1 in 80,000, equivalent to a grand total of 630 clicks out of the 52 million ads we logged.<\/p>\n<h3>The Notifications<\/h3>\n<p>The notifications used deception, fear, and hope to entice users to click on the links. The themes included impersonation of legitimate financial services like Bradesco, Sparkasse, Recibiste, MasterCard, Touch \u2018n Go, and GCash. Clickbait lures included references to scandals, politicians, and famous personalities. The use of figures like Elon Musk led to investment scams and fake news sites. Other notifications led to adult content scam sites, in which victims likely unwittingly interact with AI bots and paid personalities, while giving rights to their personal text and images to the website for commercial use. Scare tactics typically led to unnecessary anti-virus subscriptions. While the affiliate advertising ecosystem is structured in a way that distributes responsibility across multiple services, the behavior of associated partners and affiliates remains relevant when assessing ecosystem risk. Figure 7 shows a distribution of lure types we observed.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-7.jpg\" alt=\"Figure 7\" \/><\/p>\n<p class=\"image-caption\">Figure 7. Percentages of the different types of lures used in the notifications we analyzed<\/p>\n<h3>Their Economy<\/h3>\n<p>One question remained: The domains we took over had been running for a while, so how much money did this threat actor actually make with this push notification infrastructure? Considering how few people actually click on the notifications, were the campaigns even profitable? If not, that might explain why they abandoned their domains.<\/p>\n<p>This notification network has two different cost models: Cost Per Mile (1000 impression \/ CPM), and Cost Per Click (CPC). Considering how low the click through rate was, we assumed that ads using the CPC cost model would make them a negligible amount of money, and after verifications, we were right. Over the 15 days of data we looked at, ads using this cost model generated $1.80 (that is correct&#8211;the dot is not misplaced: one dollar and 80 cents).<\/p>\n<p>So, we focused on the cost of the CPM ads. To the best of our ability, we can estimate that they were making about $350.00 per day from these ads. Not to minimize the value of the dollar, but this seemed very low.<\/p>\n<p>The ad publishers here are all sketchy, so we are not really rooting for them, but we can\u2019t help but wonder what they get from advertising on these platforms? One thing that confused us from our logs at the start of our analysis was that the same victim would be shown the same ad multiple times. We started doubting the integrity of our data, and tried to remove duplicate entries, but there were basically none! There were partial duplicates for sure: the same ad being pushed to the same victim at the exact same time with the exact same notification body and title. Each time, the price of the notification would be slightly different, so we were a bit perplexed&#8230; until we realized that each time, these duplicated ads <em>had different delays<\/em>.<\/p>\n<p>Different delays mean that despite getting paid per 1000 ad impressions, this threat actor shows victims the same ad, up to 20 times per day. Obviously, this is annoying for the victims who get spammed with the same scam more than once, but this must also be a genuinely bad investment for the \u201cadvertisers\u201d trying to scam victims, right? The likelihood that someone who did not fall for your scam on the 19th time that day falls for it on the 20th time must be incredibly low. This threat actor isn\u2019t just scamming regular people; their pricing and delivery practices appear to disadvantage their own advertising affiliates\u2014which is consistent with public complaints about the platform.<\/p>\n<p>At this point, something seemed off, so we tried to figure out what was impacting the price of ads, and what we might be missing.<\/p>\n<p>We looked at the parameters that influence the price of ads for other similarly shady push notification services we are tracking (Figure 8).<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-8.jpg\" alt=\"Figure 8\" \/><\/p>\n<p class=\"image-caption\">Figure 8. Price of notifications per day per target country<\/p>\n<p>As expected, victims in some countries are more expensive than victims in other countries. Importantly, victims in India are worth basically nothing, and as we mentioned before, about 20% of the notifications we tracked were sent to victims in India. The other interesting aspect of this graph is that, regardless of the country to which the ad is being pushed, the average CPM (Cost per 1000 impressions) is still very low. From looking at publicly advertised pricing and features commonly promoted by similar push-notification monetization services, we would normally expect prices significantly higher than those observed in our data. It is unclear whether the discrepancy reflects differences between publicly advertised pricing for comparable services and the subset of traffic we observed, or whether it is specific to the domains included in our dataset.<\/p>\n<p>As shown in Figure 9 below, most ads cost less than 5 cents (note the graph uses a logarithmic scale) regardless of the payment model used. One important thing to note is that the number of ads per price bracket doesn\u2019t decrease either logarithmically or linearly. For CPM ads, there is a sort of plateau as they start costing more than 25 cents. For CPC ads, their number oddly vanished around under 20 cents, but a surprisingly high number of them cost between 20 and 25 cents, which seems to be their maximum cost. We can only really speculate as to why that is, but one guess is that there is some kind of increased competition for more valuable victims, driving the price of ads targeting valuable users higher than expected.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-9.jpg\" alt=\"Figure 9\" \/><\/p>\n<p class=\"image-caption\">Figure 9. Number of ads observed per price bracket<\/p>\n<p>Apart from the country their victims are from, it is unclear if any of the other \u201cfeatures\u201d this threat actor offers to their publishers are valuable. For example, they have an \u201cHQ\u201d feature (presumably standing for \u201chigh quality\u201d), but the victims with that flag are not being pushed more expensive ads than anyone else. Their IP mismatch feature also doesn\u2019t seem to work, so the flag is often set to True despite the victim using the same IP as when they were sent ads. And with regards to their other FP prevention features, we could not verify any of them were reliable, as none of them ever triggered. Even if those features were working as intended, it seems like either: \u201cadvertisers\u201d do not trust them, as they have no impact on the bidding price for ads; or they do not care about who they advertise to, potentially because they have no other option to advertise their scams, and they have accepted that victims accidentally clicking their ads is the only way they can get traffic.<\/p>\n<p>The last factor we thought might influence the price of ads was their content. We classified ads according to their lure, trying to find out whether some ads were inherently more valuable. As Table 2 below shows, this does not appear to be the case. No matter the kind of ads, and the lure they use to deceive victims, they are all priced roughly the same.<\/p>\n<table>\n<thead>\n<tr>\n<th>Notification Lure<\/th>\n<th>Notification Count<\/th>\n<th>Victim Count<\/th>\n<th>Average CPM<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Gambling Scams<\/td>\n<td>19,674,313<\/td>\n<td>19,635<\/td>\n<td>$0.01<\/td>\n<\/tr>\n<tr>\n<td>Money<\/td>\n<td>7,227,396<\/td>\n<td>18,415<\/td>\n<td>$0.01<\/td>\n<\/tr>\n<tr>\n<td>Other<\/td>\n<td>4,071,338<\/td>\n<td>16,923<\/td>\n<td>$0.01<\/td>\n<\/tr>\n<tr>\n<td>Fake Notification<\/td>\n<td>7,695,239<\/td>\n<td>16,180<\/td>\n<td>$0.01<\/td>\n<\/tr>\n<tr>\n<td>Adult Content<\/td>\n<td>2,981,009<\/td>\n<td>15,884<\/td>\n<td>$0.02<\/td>\n<\/tr>\n<tr>\n<td>Security Alert<\/td>\n<td>4,948,413<\/td>\n<td>15,505<\/td>\n<td>$0.02<\/td>\n<\/tr>\n<tr>\n<td>Other Urgent Alerts<\/td>\n<td>2,262,384<\/td>\n<td>15,420<\/td>\n<td>$0.02<\/td>\n<\/tr>\n<tr>\n<td>Crypto Currencies<\/td>\n<td>1,051,895<\/td>\n<td>9,464<\/td>\n<td>$0.02<\/td>\n<\/tr>\n<tr>\n<td>Prohibited Content<\/td>\n<td>1,087,706<\/td>\n<td>9,336<\/td>\n<td>$0.01<\/td>\n<\/tr>\n<tr>\n<td>Fake News<\/td>\n<td>463,588<\/td>\n<td>7,706<\/td>\n<td>$0.02<\/td>\n<\/tr>\n<tr>\n<td>Government Scams<\/td>\n<td>389,605<\/td>\n<td>6,518<\/td>\n<td>$0.02<\/td>\n<\/tr>\n<tr>\n<td>Health Scam<\/td>\n<td>152,825<\/td>\n<td>2,170<\/td>\n<td>$0.01<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"image-caption\">Table 2. Number of notifications, victims, and the average CPM per lure category. (Note that victims can be counted more than once in this table if they have been pushed notifications with different lures.)<\/p>\n<p>No matter what variable we tried to isolate, how much we tried to clean up our data to remove outliers and make sure we were not comparing apples to oranges, we couldn\u2019t find anything to explain the low price of those scam push notifications. One possible explanation is that the infrastructure was no longer economically viable.<\/p>\n<h3>Distributed Deniability<\/h3>\n<p>The operational characteristics observed in this push-notification monetization service align with patterns commonly seen across similar services in the gray-market advertising ecosystem. These patterns include the use of Telegram-based channels for affiliate recruitment and promotion, including Russian-language channels, as well as infrastructure and business models frequently associated with Eastern European push-monetization operations. Discussions on underground advertising forums regularly include complaints and allegations of deceptive practices directed at services exhibiting these characteristics. Together, these factors illustrate how responsibility and accountability are often diffused across interconnected services within this ecosystem.<\/p>\n<p>In this service, the notification hyperlinks contain a rich set of unencrypted data. Every user click sends detailed information to their server that records the bidding process, images used in the notification, and data about the device. The message is assembled from components spread across commercial content distribution networks (CDNs) that market their services to gray-hat and black-hat advertising operations. Images are hosted on one service; user information is tracked on another. See Figure 10 for some of the component images in notifications from this service which are loaded from different providers.<\/p>\n<div class=\"img-container\">\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-10a.jpg\" alt=\"Figure 10a\"><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-10b.jpg\" alt=\"Figure 10b\">\n<\/div>\n<p class=\"image-caption\">Figure 10. Individual images shown in browser notifications are fetched from dedicated servers run by separate commercial entities<\/p>\n<p>Ultimately, the network is dependent on the services of a variety of other commercial entities to operate. Some of these are abused; their customer base includes both legitimate and sketchy actors. But others are consistently associated with infrastructure used in cybercriminal activity, whether by choice or circumstance. These providers, whether they be hosting providers or software services, make scam and malware distribution at scale possible. At the same time, each one is typically only one component of a very complicated operation. Regardless of where these commercial entities are registered, we believe the micro-segmentation of services that make this all possible is a structure that results in distributed operational responsibility.<\/p>\n<p>Beyond the distributed nature of the affiliate advertising economy, many scammers view different types of fraud with relative morality. For instance, investment scams might be viewed as pure theft. But they perceive other types of digital fraud as lesser evils when the user agrees to terms and conditions (T&#038;C). Of course, most users do not review these documents, and if they do, they are unlikely to understand the tangle of legalese, but scammers believe they are absolved of any wrongdoing by the \u201cfine print.\u201d<\/p>\n<p>We\u2019ve noticed that many push monetization services have adopted language that warns the subscriber that \u201cnotifications may contain errors, inaccuracies, or content that you find objectionable.\u201d They, the transmitter of this information, accept no blame. They also sometimes include directions on how to change notification settings in the browser, even though users are unlikely to see these warnings. See Figure 11.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-11a.jpg\" alt=\"Figure 11a\" \/><br \/>\n<img decoding=\"async\" class=\"blog-image\" src=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-a-malicious-push-network-what-57m-logs-taught-us-figure-11b.jpg\" alt=\"Figure 11b\" \/><\/p>\n<p class=\"image-caption\">Figure 11. These screenshots show partially extracted terms and conditions from a commercial push monetization service. This service is not the subject of this paper and is shown solely as an illustrative example.<\/p>\n<p>Advertising networks often have guidelines for the \u201ccreatives\u201d that are used in notifications. These requirements <a href=\"https:\/\/clickadilla.com\/help\/advertisers\/3123305-what-are-the-requirements-for-the-content-on-web-push-creatives\" target=\"_blank\"><strong>often walk a thin line<\/strong><\/a> between deception and outright lies. They might claim to reject messages like \u201cYour computer has HDD malfunction\u201d but allow \u201cYour computer might be damaged\u201d because it is \u201cless aggressive.\u201d We have studied several commercial affiliate advertising networks and have yet to find one that enforces their published guidelines.<\/p>\n<p>According to the website of the platform that we analyzed, their compliance team reviews all advertising content and will purportedly reject deceptive messages. But the data included notifications like:<\/p>\n<ul class=\"list-spacing\">\n<li>\u201c\u00a1Android infectado con MALWARE!\u201d (Android infected with malware!)<\/li>\n<li>\u201cSystem ben\u00f6tigt einen Scan\u201d (System needs a scan)<\/li>\n<li>\u201cbellek dolu\u201d (memory full)<\/li>\n<li>\u201c5 viruses detected!\u201d<\/li>\n<li>\u201cWhatsApp ra\u010dun je blokiran\u201d (WhatsApp account blocked)<\/li>\n<li>\u201cSparkasse: Zahlungseingang\u201d (Sparkasse Payment Received)<\/li>\n<\/ul>\n<p>From millions of push notifications, we saw these lures are the rule, not the exception. Until push notification networks distributing deceptive content place firmer controls on their affiliate content, we consider them a high risk. Fine print that puts the burden of fraud onto the victim is not sufficient.<\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\nmargin-top:auto;\n}\n.list-spacing li{margin-bottom:20px}\n.img-container, .img-container-3-col {\ndisplay: flex;\n}\n.img-container img {\n    width: 40%;\n    margin-bottom: 10px;\n    height: max-content !important;\n}\n.img-container-3-col img {\nwidth: 30%;\nmargin-bottom: 10px;\n}\n@media (max-width: 767px) {\n.img-container, .img-container-3-col {\ndisplay: block;\n}\n.img-container img, .img-container-3-col img {\nwidth: 100%;\n}\n.grid-container {\n    grid-template-columns: 1fr!important;\n  }\n}\n@media (min-width: 767px) {\n.img-50{width:50%;}\n}\n.grid-container {\n  display: grid;\n  grid-template-columns: repeat(2, 1fr);\n  gap: 40px;\n  max-width: 800px;\n  margin: 0 auto;\n  align-items: stretch;\n}\n.grid-item {\n   display: flex;\n  flex-direction: column;\n  justify-content: flex-start;\n}\n.grid-item img {\n  width: 100%;\n  height: auto;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('<span class=\"gradient\">Inside a Malicious Push Network<\/span>: What 57M Logs Taught Us');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who doesn\u2019t love to eavesdrop onto a juicy conversation? We recently snooped on the communications of an affiliate advertising push notification system whose DNS records were left misconfigured&#8211;oops. This mistake allowed us to receive a copy of every ad they sent victims, along with all the metrics they recorded. We analyzed over 57M logs collected [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12819,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[968,1521,1522,1385,1523,902,1524,30,828,1525,1125],"class_list":{"0":"post-12818","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-push-notification","9":"tag-lame-delegation","10":"tag-sitting-ducks","11":"tag-dns-misconfiguration","12":"tag-affiliate-advertising","13":"tag-tds","14":"tag-brand-impersonation","15":"tag-dns","16":"tag-scam","17":"tag-digital-fraud","18":"tag-domain-hijacking","19":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Inside a Malicious Push Network: What 57M Logs Taught Us<\/title>\n<meta name=\"description\" content=\"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Inside a Malicious Push Network: What 57M Logs Taught Us\" \/>\n<meta property=\"og:description\" content=\"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-15T15:55:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-16T08:43:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Inside a Malicious Push Network: What 57M Logs Taught Us\" \/>\n<meta name=\"twitter:description\" content=\"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"29 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Inside a Malicious Push Network: What 57M Logs Taught Us\",\"datePublished\":\"2026-01-15T15:55:47+00:00\",\"dateModified\":\"2026-01-16T08:43:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\"},\"wordCount\":5888,\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg\",\"keywords\":[\"push notification\",\"lame delegation\",\"Sitting Ducks\",\"DNS misconfiguration\",\"affiliate advertising\",\"TDS\",\"brand impersonation\",\"DNS\",\"scam\",\"digital fraud\",\"Domain Hijacking\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\",\"url\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\",\"name\":\"Inside a Malicious Push Network: What 57M Logs Taught Us\",\"isPartOf\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg\",\"datePublished\":\"2026-01-15T15:55:47+00:00\",\"dateModified\":\"2026-01-16T08:43:25+00:00\",\"description\":\"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage\",\"url\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg\",\"contentUrl\":\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infoblox.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Inside a Malicious Push Network: What 57M Logs Taught Us\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#website\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"name\":\"blog.infoblox.com\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\/\/www.infoblox.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Inside a Malicious Push Network: What 57M Logs Taught Us","description":"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/","og_locale":"en_US","og_type":"article","og_title":"Inside a Malicious Push Network: What 57M Logs Taught Us","og_description":"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/","og_site_name":"Infoblox Blog","article_published_time":"2026-01-15T15:55:47+00:00","article_modified_time":"2026-01-16T08:43:25+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Inside a Malicious Push Network: What 57M Logs Taught Us","twitter_description":"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"29 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Inside a Malicious Push Network: What 57M Logs Taught Us","datePublished":"2026-01-15T15:55:47+00:00","dateModified":"2026-01-16T08:43:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/"},"wordCount":5888,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg","keywords":["push notification","lame delegation","Sitting Ducks","DNS misconfiguration","affiliate advertising","TDS","brand impersonation","DNS","scam","digital fraud","Domain Hijacking"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/","name":"Inside a Malicious Push Network: What 57M Logs Taught Us","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg","datePublished":"2026-01-15T15:55:47+00:00","dateModified":"2026-01-16T08:43:25+00:00","description":"A DNS misconfiguration allowed us to become an \u201cobserver on the side\u201d of a malicious push notification operation. Here\u2019s what we learned.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/inside-push-network-thumbnail.jpeg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/inside-a-malicious-push-network-what-57m-logs-taught-us\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Inside a Malicious Push Network: What 57M Logs Taught Us"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"blog.infoblox.com","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12818"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12818\/revisions"}],"predecessor-version":[{"id":12841,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12818\/revisions\/12841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12819"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}