Skip to main content
News Plus 15 Feb 2023 - 3 min read

Ad fraud targeting Google Adsense, Twitter, Bing surges – almost 11,000 WordPress sites hit

By Andrew Birmingham - Editor - CX | Martech | Ecom

An ad fraud grift designed to pilfer revenue from Adsense campaigns, and flog dodgy crypto schemes into the bargain has flared up significantly in the first weeks of 2023, according to Sucuri, a US based web security firm.

What you need to know

  • Fraud is designed to harvest Adsense views and clicks and promote dodgy crypto schemes
  • Uses redirects from Google, Twitter and Bing to create an air of legitimacy
  • First detected last year but big surge in recent weeks

It is one very large and ongoing campaign of organised advertising revenue fraud.

Ben Martin, Analyst, Sucuri

An new ad fraud scheme targeting Wordpress sites hosting Google Adsense ads has surged in recent weeks. First detected by security firm Sucuri in late 2022, the attack has now infected almost 11,000 sites around the world.

This particular scheme uses redirects from Google, Bing and Twitter to create an air of authenticity.

Ad fraud remains a huge and still growing problem in the digital marketing ecosystem. The World Federation of Advertisers famously suggested that ad fraud would  overtake the illicit drugs racket by 2025 as the scale of the problem grew to $US50bn. It turns out rgw WFA might have been too conservative - Juniper Research estimated that ad fraud was worth $68bn in 2022.

Five countries - the US, Japan, China, South Korea and the UK - account for 60 per cent of the losses, according to Juniper.

While it doesn’t appear in the leaderboard, Australia is not immune. In 2021, for instance, Mi-3 reported that Australia was the desktop video ad fraud capital of the world. More recently the first industrial scale ad fraud scheme hit the digital audio sector.

Types of ad fraud
  • Click fraud: When bots or humans click on ads without any intention of engaging with the ad or purchasing the product, in order to generate false clicks and revenue for the fraudster.
  • Impression fraud: When a fraudulent publisher generates fake impressions by loading ads in hidden parts of a webpage or using bots to generate views.
  • Ad stacking: When multiple ads are stacked on top of each other, with only the top ad visible to the user, resulting in impressions for all ads in the stack.
  • Domain spoofing: When a fraudulent website pretends to be a legitimate website, in order to trick advertisers into running their ads on the fake website.
  • Bot traffic: When bots are used to generate fake traffic to a website or ad, in order to inflate the number of impressions or clicks.
  • Cookie stuffing: When a fraudulent publisher places multiple cookies on a user's browser, in order to generate false impressions or clicks on ads.
  • Viewability fraud: When fraudulent publishers place ads in areas of the website that are not visible to users, resulting in false impressions and ad views.

Motivations
The goal of the fraudsters in the scheme, described by Sucuri, seems to be two-fold: Firstly to promote a couple of dodgy crypto currency schemes but also to increase the traffic to web pages created by the fraudsters that host Google Adsense ads.

According to Sucuri’s ananlyst and researcher Ben Martin, “unwanted redirects via fake, short URLs to fake Q&A [Question and  Answer] sites result in inflated ad views/clicks and therefore inflated revenue for whomever is behind this campaign. It is one very large and ongoing campaign of organised advertising revenue fraud.”

Sucuri found that fraudsters were using legitimate services from Cloudflare, a company that provides a service to help make websites faster, more secure and reliable and which also provides security features to help protect the website from malicious traffic and attacks, such as DDoS (Distributed Denial of Service) attacks.

After being booted from Cloudflare, the fraudsters shifted to DDoSGuard, which Martin describes as “a controversial Russian DDOS service that operates as a Belize corporation".

In a company blog about the fraud, Martin: “We strongly encourage website owners to patch all software to the latest version to mitigate risk and secure wp-admin panels with 2FA or other access restrictions.” Companies that have already been infected were advised to “change all access point passwords, including admin credentials, FTP accounts, cPanel, and hosting.”
The company also provided a step-by-step guide to cleaning websites that have been hit.

What do you think?

Search Mi3 Articles