Huge ad tech fraud, meet the “Methbots”

Dec 20, 2016 by

Huge ad tech fraud, meet the “Methbots”

With Facebook admitting to numerous errors in its advertising metrics, news that a group of Russian criminals are making between $3 million and $5 million every day in a brazen attack on the advertising market appears prescient. Amid headlines of “fake news” and censorship, Forbes exposes Methbotthe biggest digital ad fraud ever uncovered and perpetrated by faking clicks on video ads.

As security firm WhiteOps – who discovered the fraud – explains…

Controlled by a single group based in Russia and operating out of data centers in the US and Netherlands, this “bot farm” generates $3 to $5 million in fraudulent revenue per day by targeting the premium video advertising ecosystem, read more here…

As Forbes’ Thomas Fox-Brewster explains, the crew, which White Ops dubbed Ad Fraud Komanda or “AFK13”, planned their machinations in meticulous detail.

First, they created more than 6,000 domains and 250,267 distinct URLs within those that appeared to belong to real big-name publishers, from ESPN to Vogue. But all that could be hosted on the page was a video ad.

With faked domain registrations, they were able to trick algorithms that decided where the most profitable ads would go into buying their fraudulent web space. Those algorithms typically make bids for ad space most suitable for the advertisement’s intended audience, with the auction complete in milliseconds. But AFK13 were able to game the system so their space was purchased over big-name brands.

AFK13 then invested heavily in a bot farm, taking up space in data centers so they could fire faked traffic from more than 570,000 bots at those ads, thereby driving revenue thanks to the pay per click system they exploited.

 

 

As part of what White Ops called the Methbot campaign, those bots “watched” as many as 300 million video ads a day, with an average payout of $13.04 per thousand faked views. And the fraudsters had their bot army replicate the actions of real people, with faked clicks, mouse movements and social network login information.

It’s unclear where the Russian link comes from. Eddie Schwartz, chief operating officer at White Ops, told me the company found links between the data centers and the “unique signals” used by the hackers. He couldn’t provide more details for fear of revealing too much about White Ops’ methods. Nevertheless, he claimed to have “direct attribution” for those behind the crime.

“We have zero doubt this is a group based in Russia, it’s a single group. We’ve actually been working with federal law enforcement for weeks now,” Schwartz added.

Finally Fox-Brewster concludes worryingly, the fraud could be even bigger than reported today.

“Because White Ops is only able to analyze data directly observed by White Ops, the total ongoing monetary losses within the greater advertising ecosystem may be exponentially greater,” the company wrote in its white paper.

“At this point the Methbot operation has become so embedded in the layers of the advertising ecosystem, the only way to shut it down is to make the details public to help affected parties take action.”

Makes one wonder just how ‘real’ the internet spend metrics are?

by Tyler Durden

To learn more about other frauds, click here, Find the Fraud

For more information about Telic, Tapstone, Jeff Morgan, Jonathan David of Tapstone, and others, see below

Click here for to read part 1,  “Ad_Tech stock swindles”

Click here to read part 2, “Did Tapstone spin off from a spammer?

Click here to read part 3, “Tapstone is spammer Telic rebranded?

Click here to read part 4, “Tapstone and Telic. Spam operation?

Click here to read part 5, “Does Tapstone sell data of this quality?

Direct communications to The Narrator should be made through the contact link at the bottom of this page.

Related Posts

Share This

Digital Arteries