A new report has uncovered a massive advertising fraud scheme that made scammers serious cash, fooled marketing companies and killed users' smartphone batteries. The scheme operated via fake banner advertisements that were secretly hidden behind legitimate banner ads in Android apps, according to BuzzFeed News. This scam was previously spotted by at least two ad fraud detection firms, Protected Media and online media verification firm DoubleVerify's ad fraud lab. A new report has uncovered a massive advertising fraud scheme that let made scammers serious cash, fooled marketing companies and killed users' smartphone batteries Fraudsters were able to hijack in-app ads in apps using Twitter's MoPub ad platform. App developers say they've received complaints of their apps draining consumers' phone batteries, BuzzFeed said, but they often can't explain the source of the battery drain.
BuzzFeed News has confirmed a massive ad fraud scheme, which was originally uncovered by at least two fraud detection firms, that drained users' batteries and data. The scheme begins by hijacking the in-app advertisements of developers using Twitter's MoPub ad platform. It then silently runs autoplaying video ads behind legit banner advertisements, with the users being none the wiser. And since the video ads are still marked as completed even though none of the viewers got to see them, the scheme also rips off hapless advertisers. Protected Media, one of the anti-fraud firms that discovered the scheme, absolved Twitter of any wrongdoing -- the social network itself was merely exploited by the fraud's masterminds.
Viant, a people-based technology company, announced the results from its Feeding America pro-bono display advertising campaign that ran on its Adelphic self-service DSP from April – May 2020, driving more than 1,500 site visits and critical donations during COVID-19. Feeding America, the nation's largest hunger-relief and food rescue organization, has seen increased need amidst the pandemic, requiring essential support as unemployment continues to rise, and many struggle to feed their families. "Feeding America is incredibly grateful for the support that we've received from Viant as we seek out new ways to raise donations to help feed the millions of people turning to food banks for help," said Christine Greeley, VP, Brand, Feeding America. "With projections indicating more than 54 million people could be at risk of hunger this year due to COVID-19, the incoming donations spurred by our campaign executed through their Adelphic technology, will help make a difference for our neighbors in need." "Philanthropy is very much part of our culture and reflected in our Viant Cares program, which encourages volunteer work and contributions to causes near and dear to our employees. As many around the world have watched the unprecedented impact that COVID-19 has had, Viant was eager to do our part and devote resources to an organization with a mission like Feeding America," said Tim Vanderhook, Co-Founder & CEO, Viant Technology.
Google pulled a number of popular Android apps from the Play Store after BuzzFeed News has discovered a large-scale ad fraud scheme their developers were pulling off. Six of those apps were by DU Group, a developer that spun off from Chinese tech giant Baidu a year ago. DU's properties include the immensely popular Selfie Camera app that's been downloaded over 50 million times from the Play Store. Ad fraud researcher Check Point found that it contains code that causes the app to automatically click on advertisements without the user's knowledge. Users don't even need to fire up the app: the clicks happen even if the application isn't running, which means it can drain battery and consume data.
Late last year, DoubleVerify Inc., a company that offers software for advertisers and ad vendors to authenticate ad inventory, identified a scheme it says was designed to take advantage of the growing adoption of Ads.txt. DoubleVerify estimated the scam could have taken between $70 million and $80 million of advertisers' spending a year had it gone unchecked. First, the fraudsters scraped content from legitimate sites to create copies. Then they deployed "botnets" of consumer devices infected with malware to generate fake page views on the mock sites. Usually, this is where Ads.txt could go some way to preventing fraud: Buyers offered the resulting ad impressions could check the legitimate sites' Ads.txt files to see whether the impressions come from authorized vendors.