Pushpaganda used Google Discover and AI-written clickbait to push malicious notifications


A new threat campaign called Pushpaganda abused Google Discover to push deceptive stories into the feeds of Android and Chrome users, then tricked them into enabling browser notifications that delivered scareware and scam luses. HUMAN’s Satori Threat Intelligence and Research Team says the operation relied on AI-generated content, aggressive SEO tactics, and deceptive site behavior.

The campaign was not just about fake articles. HUMAN says the real goal was to turn real users into a source of invalid traffic and ad revenue by pushing them into persistent notification subscriptions and repeated visits to actor-controlled domains. At its peak, the operation generated about 240 million bid requests tied to 113 domains in a single seven-day period.

Google says it has already deployed a fix to stop this kind of low-quality, manipulative content from surfacing in Discover. In a statement reported by The Hacker News, the company said it had launched the fix before learning of the report and pointed to its existing spam-fighting systems and policies.

How Pushpaganda got into Discover

HUMAN says the actors created 113 domains and used AI to generate sensational articles and images meant to attract clicks at a glance. Those stories then appeared in Google Discover feeds through either advanced SEO or paid placement, although the researchers said they could not confirm which route was used in every case.

The campaign first focused on India, then expanded to Australia, the United States, and other regions. The Hacker News, citing the HUMAN report and follow-up reporting, also said the operation reached Canada, South Africa, and the U.K.

That distribution channel matters because Discover sits in a high-visibility spot. HUMAN describes it as a personalized news stream shown across Google properties, including Android home screens and blank Chrome tabs, which gave the actors access to users outside the usual email or SMS scam pipeline.

One click turned into persistent scareware

After users clicked a deceptive story, they landed on an actor-controlled page that immediately triggered a notification prompt. HUMAN says many users clicked “Allow” either to get past the pop-up or because they believed it was required to access the content.

Diagram Outlining the Pushpaganda Threat (Source – Human)

Once a user subscribed, the site could push notifications directly at the operating-system level. HUMAN says those messages bypassed traditional ad blockers and often used fear-heavy themes such as fake arrest warrants, false missed calls from family members, and bogus financial alerts.

The notifications had little or nothing to do with the original article. Clicking one often sent the user to another actor-controlled domain, which then repeated the cycle and expanded the operators’ traffic and monetization chain.

The ad fraud angle made the scheme more profitable

HUMAN says some Pushpaganda domains used deceptive buttons labeled things like “Apply Now,” “Claim Now,” or “Join WhatsApp.” Instead of completing the promised action, those buttons opened new active tabs while a background tab rotated through more Pushpaganda-linked pages.

That tab-rotation behavior quietly loaded ads and inflated session activity, making the traffic look more valuable to advertising systems than it really was. HUMAN says the result was more ad impressions and revenue from users who never meant to engage with those pages in the first place.

Deepfake Ad on a Pushpaganda-Associated Domain (Source – Human)

Researchers also saw deepfake-style creative embedded in ads on those domains, including content that appeared to misuse the likeness of celebrities and medical professionals. That added another layer of trust abuse on top of the Discover manipulation and push-notification scam chain.

Pushpaganda at a glance

ItemWhat researchers found
Campaign namePushpaganda
Primary lureAI-generated clickbait in Google Discover
Main abuse pathNotification prompts on actor-controlled domains
Scale observed113 associated domains
Peak activityAbout 240 million bid requests in 7 days
Initial geographyIndia
Later spreadAustralia, U.S., and other regions

The table above reflects HUMAN’s report and follow-up reporting from The Hacker News.

What users should do now

  • Review browser notification permissions and remove any domain you do not recognize. HUMAN specifically recommends revoking access for suspicious sites.
  • Avoid clicking “Allow” on notification prompts from sites you did not intend to trust.
  • Treat urgent legal, banking, tax, or family-alert notifications from random sites as social engineering attempts.
  • On Chrome for Android, check notification permissions under Settings, then Site settings, then Notifications. This step appears in the sample you shared and matches the browser-based mitigation HUMAN recommends.

FAQ

What is Pushpaganda?

Pushpaganda is a scam and ad-fraud operation that used AI-generated content and Google Discover exposure to trick users into enabling malicious browser notifications.

Did Google confirm a fix?

Yes. Google told The Hacker News it had already launched a fix for the spam issue and said it uses spam-fighting systems and policies to keep manipulative content out of Discover.

Was this malware?

The strongest confirmed description is scareware, social engineering, and ad fraud delivered through notification abuse. Some follow-on pages may have pushed additional scams, but the primary public reporting centers on malicious notifications, fake alerts, and traffic monetization.

Who discovered it?

HUMAN’s Satori Threat Intelligence and Research Team identified the campaign. The researchers named in the report are Louisa Abel, Vikas Parthasarathy, João Santos, and Adam Sell.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages