Botnets are a problem we’ve all unfortunately become intimately familiar with over the past few years. How do they work you ask? Fraudsters infect a large number of computers by sneaking malicious code into software installations, disguising themselves as something innocuous. This generally happens with home users who remain completely unaware their machines are performing automated tasks over the internet to do all kinds of malicious things like monetize fraudulent sites, monetize legitimate sites with fraudulent traffic, send out spam and spread viruses.
Using a fully automated browser, a hijacked device will make html or ad calls on a browser hidden from the user’s view. With session hijacking, additional html or ad calls are made independently of the content being requested by the user. The malware running on the device inserts ads and redirections into the user experience to achieve its goal- making money.
Digital fraud siphons money from every legitimate player in our industry, which is why we’ve deployed robust brand safety and fraud protection solutions. Our proprietary technology combined with leading third-party vendors, such as DoubleVerify, allow us to preemptively identify and combat bot traffic while also providing transparency to our publishers.
Next up: Proxy Traffic
Read more from our Fraud Series:
- Fraud Series Part 1: The Irresistible Allure of Ad Dollars
- Fraud Series Part 2: Hidden Ads
- Fraud Series Part 3: Botnets & Hijacked Devices
- Fraud Series Part 4: Proxy Traffic
- Fraud Series Part 5: Domain Bait & Switch
- Fraud Series Part 6: Q&A with DoubleVerify, the Leading Industry Performance Innovator
- Fraud Series Part 7: Q&A with DoubleVerify, Top Trends & Recommendations
Leah White, Senior Manager, Product Marketing