Jump to content
  • Google Ad fraud campaign used adult content to make millions

    alf9872000

    • 343 views
    • 3 minutes
     Share


    • 343 views
    • 3 minutes

    A massive advertising fraud campaign using Google Ads and 'popunders' on adult sites is estimated to have generated millions of ad impressions on stolen articles, making the fraudsters an estimated $275k per month.

     

    The campaign was discovered by Malwarebytes, who reported it to Google and took it down for violating policies forbidding Google Ads on adult sites.

     

    While the campaign's operator is unknown, evidence collected by Malwarebytes suggests the actor is likely of Russian origin.

    'Popunders' and Google Ads

    The fraudster set up advertising campaigns on adult sites receiving massive traffic using 'popunder' ads.

     

    These advertisements are incredibly cheap and open as 'pop-ups' behind the open browser window, so the user won't see them until they close or move the main browser window.

     

    Typically, 'popunders' are used by online dating services, adult webcams, and other adult content portals.

     

    In this case, the fraudster creates legitimate-looking news portals with scraped content from other sites, which are used as 'popunder' advertisements.

     

    However, instead of showing the page's content, they overlay an iframe that promotes a 'TXXX' adult site.

     

    To generate ad revenue from these popunders, the actors also embed a Google Ad at the bottom of the page, violating Google's advertising policies, as shown below.

     

    fake-site(2).png

    Fraud site exposed by a Google Ad at the bottom (Malwarebytes)

     

    The overlaying is achieved by a dynamically built iframe that uses heavy code obfuscation to evade automatic analysis by Google's fraud detection bots. The iframe points to txxx.tube, a legitimate adult content site, which it uses to import adult content.

     

    iframe(1).png

    The iframe that points to txxx.tube (Malwarebytes)

     

    "Once a user gets the tab into focus (it was a popunder), suddenly the page rotation stops and what the user sees is what looks like another adult website (the iframe)," explains Malwarebytes.

     

    "A click anywhere on the page (the user may want to select one of the thumbnails and watch a specific video) triggers a real click on a Google ad instead."

    Article impressions

    The articles loaded in the background (under the adult content iframe) are stolen from legitimate sites, primarily tutorials, articles, and guides.

     

    These pages contained an average of five Google Ads, sometimes even including video ads that generate more substantial revenue.

     

    article.png

    Article under the iframe (Malwarebytes)

     

    The fraudster sets the background content to refresh with a new article and a fresh set of ads every nine seconds, so if the page stays open for a couple of minutes, multiple fraudulent ad impressions are generated.

     

    Similarweb metrics report that the fraudulent page generates roughly 300,000 visits per month with an average duration of 7 minutes and 45 seconds.

     

    Based on that, Malwarebytes estimated the ad impressions to be 76 million per month and the revenue to be $276k/month (based on CPM of $3.50).

     

    This number is an estimation for the particular site, and as Malwarebytes explains, there likely are more.

     

    User Feedback

    Recommended Comments

    There are no comments to display.



    Join the conversation

    You can post now and register later. If you have an account, sign in now to post with your account.
    Note: Your post will require moderator approval before it will be visible.

    Guest
    Add a comment...

    ×   Pasted as rich text.   Paste as plain text instead

      Only 75 emoji are allowed.

    ×   Your link has been automatically embedded.   Display as a link instead

    ×   Your previous content has been restored.   Clear editor

    ×   You cannot paste images directly. Upload or insert images from URL.


  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...