SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
8 TYPES OF MOBILE FRAUD
T H E D I R T Y F W O R D
By Omri Dayan
“
Wrongful or criminal deception intended to result
in financial or personal gain!
In our world, fraud is typically done by creating fake ad traffic, launching ads outside
of a user’s view, or creating several ingenious tools and mechanisms in order to
deceive advertisers as well as monetise on it.
LOSSES IN THE INDUST RY
Estimated cost of digital ad
fraud worldwide in 2018 and 2022
Juniper Research: Ad Fraud to Cost Advertisers $19 billion in 2018, 9% of Total Digital Advertising Spend
2018 $19B
2022 $44B
POPULAR TOOLS TO COMMI T F R AUD - B OTS
• Click farms are physical locations full of real mobile devices used
to perpetrate mobile click fraud.
• Drain display-based marketing campaigns (impressions).
• Also known as Bots, these are small programs usually hosted in
unsuspecting users computers that can perform various activities
on the web.
POPUL AR TOOLS TO COMMI T F R AUD - R EDIREC TS
• Click redirection is a type of click fraud common to the mobile web and app.
• Publishers run a script on an ad that automatically redirects to a third party landing
page or an app store.
POPULAR TOOLS TO COMMI T F R AUD - INC ENTIVE
•A malicious activity, more than actual fraud.
•Happens in-app.
•Incentivized campaigns work while showing ads to gain
an app-related reward and not because they’re
interested in the content.
•Media Spend can be exhausted and not yield quality
users.
8 C OMMON T Y P E S 

OF F R A UD
FRAUD 1: GHOST SI TES
• These are websites with real content, usually stolen
from other legitimate websites.
• The sites’ only purpose is to defraud advertisers.
• The site owners will create these sites and make them
available through networks and exchanges.
• Afterwards, bots are directed to the site, which in turn
generates impressions and are then purchased by
advertisers.
FRAUD 2: AD STA CKING
•Multiple ads are stacked on top of one
another, with only the top ad visible to the
viewer.
•While only one ad is visible, the impression
counts for each served ad, even the hidden
ads underneath the stack.
•This is another publisher/network specific
trick to defraud advertisers.
FRAUD 3: IFRAME - 1x1 PI X ELS
•Takes place when a 1x1 pixel –invisible to the human eye– is
placed on a site, usually done with an ad.
•These pixels can end up loading an entirely different site.
•The site that loads out of view of the user on a 1x1 pixel contains
advertising – none of which is ever seen by a user.
•This method of fraud can be used to simulate false ad
impressions or hides cookies in order to falsely attribute a
potential purchase or conversion.
FRAUD 4: DOMAIN SP OOFING
ADS = Authorized Digital Sellers
Publishers pretending to be someone they’re not in order to sell
their inventory
Domain spoofing, works in both by using malware installed on a
user’s computer or by changing the URL in an ad tag.
These methods trick ad exchanges and other programmatic platforms
into thinking that the user is visiting a legitimate site.
But actually the ad will actually appear on a different, usually
illegitimate site or displayed on a page in a hidden tab.
FRAUD 5: CLICK SPAMMING / FL OODING
Networks send a vast amount of fraudulent click reports in order to deliver the
last CLICK prior to an install.
FRAUD 6: CLICK HIG HJ AC KING
•Works by sending fraudulent click reports moments AFTER a real click
happens.
•This malware is usually hidden in legitimate and working apps.
•When a legitimate click is detected, the malware sends a false click (call)
from a competing network in order to HIGHJACK the click and attribution
of a potential install.
FRAUD 7: CLICK INJEC TION
•Click injection is a type of install hijacking.
•Malware installed on a device identifies when an install begins and sends a false click or
call during the install process.
•Like click hijacking, this malware is often hidden in apps that appear to be completely
legitimate.
FRAUD 8: SDK SP OOF ING
•Bot-based fraud.
•Malware hidden on another or the same app, In SDK
Spoofing, fraudsters add a specific code onto an app that
then sends a simulated or fictitious click, install and
engagement (events) to an MMP.
•When successful, these bots trick the advertiser into paying
for installs, events or purchases that never happened.
EVEN THE BIG ONE S FA LL FOR I T
Uber said the agency was “running a wild
west of online advertising fraud,” and
claimed credit for app downloads that
happened without customers clicking on
ads.
(CNBC ARTICLE)
A D SECURITY AND VER IF IC ATION T OOL S
The emergence of new ad formats and channels, like video or mobile, are today’s new
breeding grounds for fraud.
Companies like The Media Trust and GeoEdge were created to prevent malicious activity
coming from fraudulent networks.
These companies created tools to scan ad campaigns several times per minute in order
to help advertisers and publishers detect and avoid fraud.
G E T I N T O U C H
omri@appagent.co ● appagent.co ● blog.appagent.co

Contenu connexe

Similaire à 8 types of mobile ad fraud

Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
IABmembership
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03
IABmembership
 

Similaire à 8 types of mobile ad fraud (20)

3Ton30: The Many Faces of Ad Fraud
3Ton30: The Many Faces of Ad Fraud3Ton30: The Many Faces of Ad Fraud
3Ton30: The Many Faces of Ad Fraud
 
Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)Ias guide ad fraud essentials_2017 (1)
Ias guide ad fraud essentials_2017 (1)
 
Preventing click fraud
Preventing click fraudPreventing click fraud
Preventing click fraud
 
Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27Iab bots how to_find_them_webinar_2014_03_27
Iab bots how to_find_them_webinar_2014_03_27
 
Bot how to find them 2014_27_03
Bot how to find them 2014_27_03Bot how to find them 2014_27_03
Bot how to find them 2014_27_03
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 
The ABCs of Mobile App Fraud
The ABCs of Mobile App FraudThe ABCs of Mobile App Fraud
The ABCs of Mobile App Fraud
 
Field Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad InventoryField Guide for Validating Premium Ad Inventory
Field Guide for Validating Premium Ad Inventory
 
WTF is Ad Fraud?
 WTF is Ad Fraud? WTF is Ad Fraud?
WTF is Ad Fraud?
 
Fraudulent Internet Yellow Pages Traffic
Fraudulent Internet Yellow Pages TrafficFraudulent Internet Yellow Pages Traffic
Fraudulent Internet Yellow Pages Traffic
 
INT2016 - Paul Barford (comScore) - Invalid Traffic & Viewability: what is th...
INT2016 - Paul Barford (comScore) - Invalid Traffic & Viewability: what is th...INT2016 - Paul Barford (comScore) - Invalid Traffic & Viewability: what is th...
INT2016 - Paul Barford (comScore) - Invalid Traffic & Viewability: what is th...
 
INT2016 Keynote - Paul Barford (comScore) - Invalid Traffic & Viewability: wh...
INT2016 Keynote - Paul Barford (comScore) - Invalid Traffic & Viewability: wh...INT2016 Keynote - Paul Barford (comScore) - Invalid Traffic & Viewability: wh...
INT2016 Keynote - Paul Barford (comScore) - Invalid Traffic & Viewability: wh...
 
Programmatic Ad Fraud
Programmatic Ad FraudProgrammatic Ad Fraud
Programmatic Ad Fraud
 
500 Startups: Mobile advertising and tracking pitfalls
500 Startups: Mobile advertising and tracking pitfalls 500 Startups: Mobile advertising and tracking pitfalls
500 Startups: Mobile advertising and tracking pitfalls
 
Mobile Ad Fraud Wikileaks: Exposing the Threats
Mobile Ad Fraud Wikileaks: Exposing the ThreatsMobile Ad Fraud Wikileaks: Exposing the Threats
Mobile Ad Fraud Wikileaks: Exposing the Threats
 
Mystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification BubbleMystery Shopping Inside the Ad-Verification Bubble
Mystery Shopping Inside the Ad-Verification Bubble
 
2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA2015 Bot Baseline Report - White Ops & ANA
2015 Bot Baseline Report - White Ops & ANA
 
2012 ab is-your-browser-putting-you-at-risk-pt2
2012 ab is-your-browser-putting-you-at-risk-pt22012 ab is-your-browser-putting-you-at-risk-pt2
2012 ab is-your-browser-putting-you-at-risk-pt2
 
White Ops & Videology Whitepaper
White Ops & Videology WhitepaperWhite Ops & Videology Whitepaper
White Ops & Videology Whitepaper
 
The Art and Science of Mobile App Success - Seattle Interactive Conference 20...
The Art and Science of Mobile App Success - Seattle Interactive Conference 20...The Art and Science of Mobile App Success - Seattle Interactive Conference 20...
The Art and Science of Mobile App Success - Seattle Interactive Conference 20...
 

Plus de AppAgent / Strategic & Creative Mobile Marketing Agency

Plus de AppAgent / Strategic & Creative Mobile Marketing Agency (19)

[Webinar] Mastering UGC: How to Build Successful Collaborations with Content ...
[Webinar] Mastering UGC: How to Build Successful Collaborations with Content ...[Webinar] Mastering UGC: How to Build Successful Collaborations with Content ...
[Webinar] Mastering UGC: How to Build Successful Collaborations with Content ...
 
[Webinar] AppAgent _ ROAS Predictions for Grandmas.pdf
[Webinar] AppAgent _ ROAS Predictions for Grandmas.pdf[Webinar] AppAgent _ ROAS Predictions for Grandmas.pdf
[Webinar] AppAgent _ ROAS Predictions for Grandmas.pdf
 
Profitably scale your subscription-based app
Profitably scale your subscription-based appProfitably scale your subscription-based app
Profitably scale your subscription-based app
 
The Ultimate Guide to Designing Mobile Ads & App Store Creatives (1).pdf
The Ultimate Guide to Designing Mobile Ads & App Store Creatives (1).pdfThe Ultimate Guide to Designing Mobile Ads & App Store Creatives (1).pdf
The Ultimate Guide to Designing Mobile Ads & App Store Creatives (1).pdf
 
LTV Predictions: How do real-life companies use them & what can you learn fro...
LTV Predictions: How do real-life companies use them & what can you learn fro...LTV Predictions: How do real-life companies use them & what can you learn fro...
LTV Predictions: How do real-life companies use them & what can you learn fro...
 
6 key drivers of ASO strategy
6 key drivers of ASO strategy6 key drivers of ASO strategy
6 key drivers of ASO strategy
 
6 key drivers of ASO strategy [sneak peek of a webinar]
6 key drivers of ASO strategy [sneak peek of a webinar]6 key drivers of ASO strategy [sneak peek of a webinar]
6 key drivers of ASO strategy [sneak peek of a webinar]
 
AppAgent TikTok overview
AppAgent TikTok overviewAppAgent TikTok overview
AppAgent TikTok overview
 
AppAgent ROY mobile marketing analytics
AppAgent ROY mobile marketing analyticsAppAgent ROY mobile marketing analytics
AppAgent ROY mobile marketing analytics
 
AppAgent - Integrated Mobile Marketing Agency: Why we loved 2019
AppAgent - Integrated Mobile Marketing Agency: Why we loved 2019AppAgent - Integrated Mobile Marketing Agency: Why we loved 2019
AppAgent - Integrated Mobile Marketing Agency: Why we loved 2019
 
Case Study: Setting new mobile growth strategy based on data
Case Study: Setting new mobile growth strategy based on dataCase Study: Setting new mobile growth strategy based on data
Case Study: Setting new mobile growth strategy based on data
 
Multiplayer Soft Launch for Mobile Online Conference 2019 by Appfollow
Multiplayer Soft Launch for Mobile Online Conference 2019 by AppfollowMultiplayer Soft Launch for Mobile Online Conference 2019 by Appfollow
Multiplayer Soft Launch for Mobile Online Conference 2019 by Appfollow
 
Insider secrets - How to test new acquisition channels
Insider secrets - How to test new acquisition channelsInsider secrets - How to test new acquisition channels
Insider secrets - How to test new acquisition channels
 
AppAgent's Graphic Design Portfolio
AppAgent's Graphic Design PortfolioAppAgent's Graphic Design Portfolio
AppAgent's Graphic Design Portfolio
 
Why Creativity Can Save You a Fortune In Paid Acquisition
Why Creativity Can Save You a Fortune In Paid AcquisitionWhy Creativity Can Save You a Fortune In Paid Acquisition
Why Creativity Can Save You a Fortune In Paid Acquisition
 
Case study: Making your best mobile customers churn less
Case study: Making your best mobile customers churn less Case study: Making your best mobile customers churn less
Case study: Making your best mobile customers churn less
 
PGC Helsinki talk - 11 Deadly Marketing Sins
PGC Helsinki talk - 11 Deadly Marketing SinsPGC Helsinki talk - 11 Deadly Marketing Sins
PGC Helsinki talk - 11 Deadly Marketing Sins
 
8 mobile intelligence tools every mobile marketer should know
8 mobile intelligence tools every mobile marketer should know8 mobile intelligence tools every mobile marketer should know
8 mobile intelligence tools every mobile marketer should know
 
How to get featured by Apple & Google
How to get featured by Apple & GoogleHow to get featured by Apple & Google
How to get featured by Apple & Google
 

Dernier

Dernier (20)

SALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptxSALES-PITCH-an-introduction-to-sales.pptx
SALES-PITCH-an-introduction-to-sales.pptx
 
Best 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In ChandigarhBest 5 Graphics Designing Course In Chandigarh
Best 5 Graphics Designing Course In Chandigarh
 
The seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert CialdiniThe seven principles of persuasion by Dr. Robert Cialdini
The seven principles of persuasion by Dr. Robert Cialdini
 
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdfMicro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
Micro-Choices, Max Impact Personalizing Your Journey, One Moment at a Time.pdf
 
How consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their livesHow consumers use technology and the impacts on their lives
How consumers use technology and the impacts on their lives
 
Aiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMMAiizennxqc Digital Marketing | SEO & SMM
Aiizennxqc Digital Marketing | SEO & SMM
 
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...W.H.Bender Quote 61 -Influential restaurant and food service industry network...
W.H.Bender Quote 61 -Influential restaurant and food service industry network...
 
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of  Distribution Ad Network.pdfDistribution Ad Platform_ The Role of  Distribution Ad Network.pdf
Distribution Ad Platform_ The Role of Distribution Ad Network.pdf
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
Elevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdfElevating Your Digital Presence by Evitha.pdf
Elevating Your Digital Presence by Evitha.pdf
 
Optimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered PromptsOptimizing Your Marketing with AI-Powered Prompts
Optimizing Your Marketing with AI-Powered Prompts
 
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency EscortsAligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
Aligarh Hire 💕 8250092165 Young and Hot Call Girls Service Agency Escorts
 
Gain potential customers through Lead Generation
Gain potential customers through Lead GenerationGain potential customers through Lead Generation
Gain potential customers through Lead Generation
 
Cartona.pptx. Marketing how to present your project very well , discussed a...
Cartona.pptx.   Marketing how to present your project very well , discussed a...Cartona.pptx.   Marketing how to present your project very well , discussed a...
Cartona.pptx. Marketing how to present your project very well , discussed a...
 
personal branding kit for music business
personal branding kit for music businesspersonal branding kit for music business
personal branding kit for music business
 
The Art of sales from fictional characters.
The Art of sales from fictional characters.The Art of sales from fictional characters.
The Art of sales from fictional characters.
 
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdfTAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
TAM_AdEx-Cross_Media_Report-Banking_Finance_Investment_(BFSI)_2023.pdf
 
Social Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh BendaySocial Media Marketing Portfolio - Maharsh Benday
Social Media Marketing Portfolio - Maharsh Benday
 
SP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdfSP Search Term Data Optimization Template.pdf
SP Search Term Data Optimization Template.pdf
 
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best PracticesInstant Digital Issuance: An Overview With Critical First Touch Best Practices
Instant Digital Issuance: An Overview With Critical First Touch Best Practices
 

8 types of mobile ad fraud

  • 1. 8 TYPES OF MOBILE FRAUD T H E D I R T Y F W O R D By Omri Dayan
  • 2. “ Wrongful or criminal deception intended to result in financial or personal gain! In our world, fraud is typically done by creating fake ad traffic, launching ads outside of a user’s view, or creating several ingenious tools and mechanisms in order to deceive advertisers as well as monetise on it.
  • 3. LOSSES IN THE INDUST RY Estimated cost of digital ad fraud worldwide in 2018 and 2022 Juniper Research: Ad Fraud to Cost Advertisers $19 billion in 2018, 9% of Total Digital Advertising Spend 2018 $19B 2022 $44B
  • 4. POPULAR TOOLS TO COMMI T F R AUD - B OTS • Click farms are physical locations full of real mobile devices used to perpetrate mobile click fraud. • Drain display-based marketing campaigns (impressions). • Also known as Bots, these are small programs usually hosted in unsuspecting users computers that can perform various activities on the web.
  • 5. POPUL AR TOOLS TO COMMI T F R AUD - R EDIREC TS • Click redirection is a type of click fraud common to the mobile web and app. • Publishers run a script on an ad that automatically redirects to a third party landing page or an app store.
  • 6. POPULAR TOOLS TO COMMI T F R AUD - INC ENTIVE •A malicious activity, more than actual fraud. •Happens in-app. •Incentivized campaigns work while showing ads to gain an app-related reward and not because they’re interested in the content. •Media Spend can be exhausted and not yield quality users.
  • 7. 8 C OMMON T Y P E S 
 OF F R A UD
  • 8. FRAUD 1: GHOST SI TES • These are websites with real content, usually stolen from other legitimate websites. • The sites’ only purpose is to defraud advertisers. • The site owners will create these sites and make them available through networks and exchanges. • Afterwards, bots are directed to the site, which in turn generates impressions and are then purchased by advertisers.
  • 9. FRAUD 2: AD STA CKING •Multiple ads are stacked on top of one another, with only the top ad visible to the viewer. •While only one ad is visible, the impression counts for each served ad, even the hidden ads underneath the stack. •This is another publisher/network specific trick to defraud advertisers.
  • 10. FRAUD 3: IFRAME - 1x1 PI X ELS •Takes place when a 1x1 pixel –invisible to the human eye– is placed on a site, usually done with an ad. •These pixels can end up loading an entirely different site. •The site that loads out of view of the user on a 1x1 pixel contains advertising – none of which is ever seen by a user. •This method of fraud can be used to simulate false ad impressions or hides cookies in order to falsely attribute a potential purchase or conversion.
  • 11. FRAUD 4: DOMAIN SP OOFING ADS = Authorized Digital Sellers Publishers pretending to be someone they’re not in order to sell their inventory Domain spoofing, works in both by using malware installed on a user’s computer or by changing the URL in an ad tag. These methods trick ad exchanges and other programmatic platforms into thinking that the user is visiting a legitimate site. But actually the ad will actually appear on a different, usually illegitimate site or displayed on a page in a hidden tab.
  • 12. FRAUD 5: CLICK SPAMMING / FL OODING Networks send a vast amount of fraudulent click reports in order to deliver the last CLICK prior to an install.
  • 13. FRAUD 6: CLICK HIG HJ AC KING •Works by sending fraudulent click reports moments AFTER a real click happens. •This malware is usually hidden in legitimate and working apps. •When a legitimate click is detected, the malware sends a false click (call) from a competing network in order to HIGHJACK the click and attribution of a potential install.
  • 14. FRAUD 7: CLICK INJEC TION •Click injection is a type of install hijacking. •Malware installed on a device identifies when an install begins and sends a false click or call during the install process. •Like click hijacking, this malware is often hidden in apps that appear to be completely legitimate.
  • 15. FRAUD 8: SDK SP OOF ING •Bot-based fraud. •Malware hidden on another or the same app, In SDK Spoofing, fraudsters add a specific code onto an app that then sends a simulated or fictitious click, install and engagement (events) to an MMP. •When successful, these bots trick the advertiser into paying for installs, events or purchases that never happened.
  • 16. EVEN THE BIG ONE S FA LL FOR I T Uber said the agency was “running a wild west of online advertising fraud,” and claimed credit for app downloads that happened without customers clicking on ads. (CNBC ARTICLE)
  • 17. A D SECURITY AND VER IF IC ATION T OOL S The emergence of new ad formats and channels, like video or mobile, are today’s new breeding grounds for fraud. Companies like The Media Trust and GeoEdge were created to prevent malicious activity coming from fraudulent networks. These companies created tools to scan ad campaigns several times per minute in order to help advertisers and publishers detect and avoid fraud.
  • 18. G E T I N T O U C H omri@appagent.co ● appagent.co ● blog.appagent.co