{"id":5868,"date":"2017-01-18T22:53:19","date_gmt":"2017-01-18T22:53:19","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/18\/news-73\/"},"modified":"2017-01-18T22:53:19","modified_gmt":"2017-01-18T22:53:19","slug":"news-73","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/18\/news-73\/","title":{"rendered":"Clickjacking campaign abuses Google Adsense, avoids ad fraud bots"},"content":{"rendered":"<p><a href=\"https:\/\/blog.malwarebytes.com\/threats\/ad-fraud\/\" target=\"_blank\">Ad fraud<\/a> is one of many issues that contribute to the ad industry&#8217;s negative image these days. Unlike malvertising which affects end users by infecting them with malware, ad fraud costs advertisers billions of dollars in adverts that were never seen by real humans.<\/p>\n<p>The case we are describing today shows some interesting tricks to have people click on camouflaged adverts while thinking they are clicking on the play button of a video. The ultimate goal is to\u00a0generate pay per impression and pay per click revenues from what looks like clean and trusted traffic.<\/p>\n<p>In addition, the crooks are tracking the movements and clicks of the mouse while the user\u00a0is on the\u00a0fraudulent page, in order to be able to tell if their victim is an actual person\u00a0or simply a bot. If the latter is detected, the page will automatically redirect\u00a0to google.com to prevent\u00a0any accidental and &#8216;tainted&#8217; click on the advert.<\/p>\n<p>Apparently the bad guys are concerned about\u00a0ad fraud too when it matters to them&#8230;<\/p>\n<h3>Different means, same end goal<\/h3>\n<p>There are different ways criminals go about profiting from ad fraud, the most common one being via compromised computers (bots) that view or click on ads unbeknownst to their users. Malware like Bedep\u00a0can mimic real user activity in hidden desktops and <a href=\"https:\/\/sentrant.com\/2015\/05\/20\/bedep-ad-fraud-botnet-analysis-exposing-the-mechanics-behind-153-6m-defrauded-ad-impressions-a-day\/\" target=\"_blank\">defraud millions of ad impressions a day<\/a>.<\/p>\n<p>Late last year White Ops, a company that specializes in ad fraud research, exposed a large operation dubbed <a href=\"https:\/\/www.whiteops.com\/methbot\" target=\"_blank\">Methbot<\/a> involving a different method to generate millions in fraudulent ad revenues. Rather than relying on end user machines, the crooks leveraged data centers to create bot farms. Why bother with unreliable consumer PCs\u00a0when you can create an army of well-trained ad fraud bots\u00a0running at optimal speed on server racks?<\/p>\n<p>There are many other ways to game the ad ecosystem and they don&#8217;t always involve infecting machines or using bot farms. Sometimes ad fraud can be done in a very transparent manner that relies on a real human to perform an action, making it harder for anti-fraud systems to detect. For instance, clickjacking, a technique that consists of tricking the user to click something that is actually producing a hidden malicious action has been used in the past to do click fraud.<\/p>\n<p>The case\u00a0we are going to have a look at today is\u00a0actually related to a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/01\/clickjacking-campaign-plays-on-european-cookie-law\/\" target=\"_blank\">clickjacking attack<\/a>\u00a0we wrote about before. We discovered this ad fraud campaign via a high profile malvertising chain we have come across already that\u00a0typically redirects to exploit kits. Visitors to a high traffic\u00a0adult site are automatically redirected to what appears to be another adult streaming video page. What they don&#8217;t know is that it is completely fake and underneath of it are websites displaying paid adverts and generating the crooks money for each impression and click.<\/p>\n<h3>Gates<\/h3>\n<p>The scenario here is that traffic to some popular adult websites will get redirected via malicious advertising to one of several\u00a0fake blogs with topics ranging\u00a0anywhere from wedding tips, pest control, or\u00a0appliances.<\/p>\n<p>The redirection chain includes the mandatory passage through what we call a gate whose objective is typically to inspect incoming traffic and take actions.<\/p>\n<p>Within one of those gates, we noticed interesting bits of code that was meant to &#8220;fingerprinting&#8221; visitors to collect their IP address, User-Agent, and screen resolution via a POST request, upon the initial redirection from malvertising.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/fingerprinting_users.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15877\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/fingerprinting_users.png\" alt=\"fingerprinting_users\" width=\"600\" height=\"363\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/fingerprinting_users.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/fingerprinting_users-300x182.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 1<\/span>: Fingerprinting code at the gate\u00a0(click to enlarge)<\/em><\/p>\n<p>This information is typically harvested\u00a0by most websites for stats and optimization purposes, but given the explicit use of an appropriately named <em>getfingerprint.php<\/em> file, we can assume that the fraudsters were trying to identify real users versus crawlers or repeated visits of the same page.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/Gate_traffic.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15892\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/Gate_traffic.png\" alt=\"gate_traffic\" width=\"635\" height=\"124\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/Gate_traffic.png 635w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/Gate_traffic-300x59.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/Gate_traffic-600x117.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/Gate_traffic-630x124.png 630w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 2<\/span>: Web traffic from malvertising to gate\u00a0(click to enlarge)<\/em><\/p>\n<h3>A\u00a0fa\u00e7ade: adult gallery\u00a0hides fake blog<\/h3>\n<p>Content is one of those things that is very important to search engines and other crawlers as it ultimately gives more value to a website. A long time ago, blackhat SEO criminals used a technique known as keyword stuffing which aimed at getting the site ranked high in the search engine result pages (SERP), but it is easy to detect nowadays.<\/p>\n<p>Plagiarism is still very effective, and copy and paste has never been easier. It&#8217;s a cheap way to get some decent content with little effort. In this particular campaign, we witnessed several websites that had been created recently and filled with new blog entries.<\/p>\n<p>It didn&#8217;t take long to find out where the write-ups were stolen from: mainly sites like Ezine or Pinterest. The thieves didn&#8217;t even bother changing any of the wording, they simply did a copy\/paste to populate each of their fraudulent website with dozens of entries.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15885\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog.png\" alt=\"blog\" width=\"908\" height=\"626\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog.png 908w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog-300x207.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog-600x414.png 600w\" sizes=\"auto, (max-width: 908px) 100vw, 908px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 3<\/span>: A fake blog about weddings with stolen content (click to enlarge)<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/original.png\" data-rel=\"lightbox-3\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15886\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/original.png\" alt=\"original\" width=\"795\" height=\"734\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/original.png 795w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/original-300x277.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/original-600x554.png 600w\" sizes=\"auto, (max-width: 795px) 100vw, 795px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 4<\/span>: Original content used by fake blog found on Ezine (click to enlarge)<\/em><\/p>\n<p>If you visited one of those sites directly, you would see what seems to be a site giving advice for weddings accompanied by\u00a0a few\u00a0adverts powered by Google&#8217;s DoubleClick, which is quite typical for any website that needs to pay for its operating costs. However, only crawlers most likely visited those websites directly as the motives for setting them up was very clear: to defraud advertisers via hijacked traffic.<\/p>\n<p>A layer containing adult images is superimposed such that both content is displayed in the browser, but only the top layer (adult material) is visible to the eye.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15887\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/adult_content.png\" alt=\"adult_content\" width=\"1042\" height=\"717\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/adult_content.png 1042w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/adult_content-300x206.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/adult_content-600x413.png 600w\" sizes=\"auto, (max-width: 1042px) 100vw, 1042px\" \/><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 5<\/span>: The wedding blog turned into an adult portal thanks to an overlay (click to enlarge)<\/em><\/p>\n<p>This\u00a0is important because the crooks want to load the underlying blog and its content which includes paid adverts so that they can monetize on ad impressions, while at the same time tricking visitors into thinking they are still accessing their adult videos.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/facade.png\" data-rel=\"lightbox-4\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15862\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/facade.png\" alt=\"facade\" width=\"1049\" height=\"740\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/facade.png 1049w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/facade-300x212.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/facade-600x423.png 600w\" sizes=\"auto, (max-width: 1049px) 100vw, 1049px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 6<\/span>: Diagram of ad impression fraud via adult page overlay (click to enlarge)<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/gate_blog_ad.png\" data-rel=\"lightbox-5\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15894\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/gate_blog_ad.png\" alt=\"gate_blog_ad\" width=\"916\" height=\"436\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/gate_blog_ad.png 916w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/gate_blog_ad-300x143.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/gate_blog_ad-600x286.png 600w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 7<\/span>: Web traffic from gate to fake blog, to advert\u00a0(click to enlarge)<\/em><\/p>\n<h3>Stealing (real) users&#8217; clicks<\/h3>\n<p>The first stage of this ad fraud campaign consisted of showing a thumbnail of adult videos while displaying hidden adverts, but that is not all. Users are conned into clicking to actually view any particular video, which takes us to the second part, that involves Pay Per Click (PPC) fraud.<\/p>\n<p>The user is presented with a single adult video page but there is no actual video to be played, as it is just a screenshot designed to mimic a video player with the play button and timeline bar.<\/p>\n<p>The goal is to get users to click on a hidden\u00a0advert, but only after some validation checks that ensure the clicks are from genuine humans. This is somewhat ironic for fraudsters to check against bots.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/clickjacking.png\" data-rel=\"lightbox-6\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15879\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/clickjacking.png\" alt=\"clickjacking\" width=\"1145\" height=\"629\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/clickjacking.png 1145w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/clickjacking-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/clickjacking-600x330.png 600w\" sizes=\"auto, (max-width: 1145px) 100vw, 1145px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 8<\/span>: Diagram of fake video page which tricks the user into clicking play button\u00a0(click to enlarge)<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15881\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/hidden_ad.png\" alt=\"hidden_ad\" width=\"1032\" height=\"624\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/hidden_ad.png 1032w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/hidden_ad-300x181.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/hidden_ad-600x363.png 600w\" sizes=\"auto, (max-width: 1032px) 100vw, 1032px\" \/><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 9<\/span>: The\u00a0hidden\u00a0advert revealed with its placement over the video&#8217;s play button\u00a0(click to enlarge)<\/em><\/p>\n<p>One can actually show\u00a0the hidden advert (as seen in Figure 9) simply by clicking in the browser&#8217;s address bar which results in the banner coming at the forefront. Similarly, giving focus back to the page by clicking anywhere in it will put\u00a0the banner back in hidden mode again.<\/p>\n<p>The crooks use JavaScript code to check for user activity, in particular mouse movements and clicks. Indeed, bots often do very programmatic and predictable actions that can be detected as patterns of non real human activity.\u00a0The <em>detector.js<\/em> script from the fake blog will attempt to detect those emulated actions and immediately redirect the browser to Google&#8217;s homepage if it identifies any.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15873\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/antibot_code.png\" alt=\"antibot_code\" width=\"607\" height=\"1063\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/antibot_code.png 607w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/antibot_code-171x300.png 171w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/antibot_code-343x600.png 343w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 10<\/span>: Checking for mouse activity to ensure clicks are legitimate (click to enlarge)<\/em><\/p>\n<p>For instance, if a click is detected but the mouse hasn&#8217;t moved at all, this is a suspicious behaviour. Same goes for the mouse moving to specific onscreen coordinates at particular time frames. Malware that tries to emulate user activity will typically do some scrolls on screen or clicks, but those are usually\u00a0not very random or unique enough and they get repeated\u00a0from one infected machine to another.<\/p>\n<p>Online criminals make money by exploiting weaknesses in systems and people which make them very aware of certain pitfalls that they need to avoid. We have seen in the past malware closing the security hole that allowed it to get in, or even remove a previous infection. Similarly, when it comes to ad fraud the bad guys know very well how to ensure they are getting paid\u00a0and have less chances of getting caught.<\/p>\n<p>It also clears the browser back button URL history such that the user cannot revisit the same page again:<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/backurl.png\" data-rel=\"lightbox-7\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15884\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/backurl.png\" alt=\"backurl\" width=\"596\" height=\"545\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/backurl.png 596w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/backurl-300x274.png 300w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 11<\/span>: Changing the &#8216;back URL&#8217; based on mouse activity\u00a0(click to enlarge)<\/em><\/p>\n<p>If a real human clicked to view the non-existing video, they actually clicked on the hidden ad, thereby generating money for the crooks. Whoever got duped will soon\u00a0realize that this was just a waste of time and that no video actually loaded. Users are less likely to report on this fraud due to the nature of the content they were trying to view.<\/p>\n<p>In the meantime, the fraudsters behind this operation are making money for each view and click. Given that they only have to pay for cheap incoming traffic versus the more expensive Google Ads, this is a profitable business model.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog_clickfraud.png\" data-rel=\"lightbox-8\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15895\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog_clickfraud.png\" alt=\"blog_clickfraud\" width=\"938\" height=\"366\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog_clickfraud.png 938w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog_clickfraud-300x117.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/blog_clickfraud-600x234.png 600w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/a><\/p>\n<p><em><span style=\"text-decoration: underline\">Figure 12<\/span>: Web traffic from fake blog to click fraud\u00a0(click to enlarge)<\/em><\/p>\n<h3>Link with previous campaign<\/h3>\n<p>In January of 2016, we <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/01\/clickjacking-campaign-plays-on-european-cookie-law\/\" target=\"_blank\">wrote<\/a> about a clickjacking attack taking advantage of the new European law on browser cookies. Similarly, users were tricked into clicking on &#8216;I accept cookies&#8217; which actually clicked on an ad banner and defrauded legitimate advertisers.<\/p>\n<p>The domain names used then and now have\u00a0a similar pattern with\u00a0the word\u00a0&#8216;<em>webhosting<\/em>&#8216; in it, which could be a coincidence of course, but is noteworthy since both campaigns use clickjacking to abuse Google AdSense.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/traffic_previous_campaign.png\" data-rel=\"lightbox-9\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-15891\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/traffic_previous_campaign.png\" alt=\"traffic_previous_campaign\" width=\"704\" height=\"388\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/traffic_previous_campaign.png 704w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/traffic_previous_campaign-300x165.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/traffic_previous_campaign-600x331.png 600w\" sizes=\"auto, (max-width: 704px) 100vw, 704px\" \/><\/a><\/p>\n<p><em>Figure 13: Traffic capture from the European cookie clickjacking campaign<\/em><\/p>\n<p>Another interesting aspect is the use of filters (i.e. <em>filter.php<\/em>, <em>process.php<\/em>) to weed out bots or machines that are already blacklisted. This was not something we had covered in our original blog post but by comparing with past captures, we can see the idea\u00a0is very similar, although not as sophisticated.<\/p>\n<h3>Closing thoughts<\/h3>\n<p>There aren&#8217;t many industries that generate as many heated debates as the ad industry does. One argument that you will often hear is that ad agencies, networks and publishers still make money whether an ad is malicious or never was actually viewed by anyone.\u00a0There is also a direct correlation between digital <a href=\"http:\/\/www.slideshare.net\/augustinefou\/state-of-digital-ad-fraud-2017-by-augustine-fou\/7\" target=\"_blank\">ad spend and ad fraud<\/a>\u00a0over the past few years.<\/p>\n<p>This does not mean that the involved\u00a0parties are desensitized to malware or fraud (they invest a lot of resources to combat that problem). In fact, treating them as &#8216;they&#8217; is a poor choice since it assumes everyone is on the same level. We know that there are some networks\/publishers\u00a0that turn a blind eye &#8211; or worse &#8211; are directly affiliated with criminal\u00a0gangs, while others are actually taking an active stance to fight malware and fraud.<\/p>\n<p>The problem remains that there is an ever growing concern from both users (adopting ad blockers at a fast pace) and advertisers, <a href=\"http:\/\/adcontrarian.blogspot.ca\/2017\/01\/display-ads-my-3-worth.html\" target=\"_blank\">getting less and less bang for their buck<\/a>. Just like with malvertising, as long as there is an economic gain, criminals will keep on pursuing their abuse to exploit advertising as a unique and profitable fraud and infection vector.<\/p>\n<p>We have notified\u00a0Google and passed along the necessary information about this abuse of their ad platform.<\/p>\n<h3>Further reading:<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.slideshare.net\/augustinefou\/state-of-digital-ad-fraud-2017-by-augustine-fou\/7\" target=\"_blank\">State of digital ad fraud 2017<\/a>\u00a0[Slideshare] by Augustine Fou.<\/li>\n<li><a href=\"http:\/\/go.integralads.com\/rs\/469-VBI-606\/images\/IAS_Ad%20Fraud%20101%20Guide_US.pdf?mkt_tok=eyJpIjoiTjJGalkyVmlOMk01TlRWaSIsInQiOiJXTVFUMnY4RjZqRThYbmprdG9nbktHSUFiM0h3U0RLRE1xY0M4bThxWTA2RkZIYUt5M29rdFVIeVhOa25VdG9CTUxmWXhJVXlBbG5CQUpWcXhnNU8wMDdSa3I5clA4UVd2QnRpa1hqaGR2VGhNQ3BzUlpSOU1UTEsrYktlVmhpRCJ9\" target=\"_blank\">Ad fraud 101<\/a>\u00a0[PDF]\u00a0Integral Ad Science<\/li>\n<\/ul>\n<h3>IOCs:<\/h3>\n<p><span style=\"text-decoration: underline\">Gates<\/span>:<\/p>\n<p><em>stockwebhosting[.]com<\/em><br \/> <em>doctorwebhosting[.]com<\/em><br \/> <em> triwebhosting[.]com<\/em><br \/> <em> webhostingfashion[.]com<\/em><\/p>\n<p><span style=\"text-decoration: underline\">Fake blogs<\/span>:<\/p>\n<p><em>justhappymarriage[.]com<\/em><br \/> <em> myamericansofa[.]com<\/em><br \/> <em> instaautohire[.]com<\/em><br \/> <em> bugcurb[.]com<\/em><br \/> <em> bestautotariff[.]com<\/em><br \/> <em> pestdomination[.]com<\/em><br \/> <em> pleasedwedding[.]com<\/em><br \/> <em> nicewashing[.]com<\/em><br \/> <em> theusaappliance[.]com<\/em><br \/> <em> topcaraccidentals[.]com<\/em><br \/> <em> perfectpurification[.]com<\/em><\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/clickjacking-campaign-abuses-google-adsense-avoids-ad-fraud-bots\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/clickjacking-campaign-abuses-google-adsense-avoids-ad-fraud-bots\/' title='Clickjacking campaign abuses Google Adsense, avoids ad fraud bots'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2013\/11\/fraud-1-category.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Ad fraud is a billion dollar problem for advertisers. When real users are tricked into clicking on ads they can&#8217;t even see, (almost) everyone loses.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/doubleclick\/\" rel=\"tag\">doubleclick<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ek\/\" rel=\"tag\">EK<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/exploit-kits\/\" rel=\"tag\">exploit kits<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-ads\/\" rel=\"tag\">Google Ads<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google-adsense\/\" rel=\"tag\">Google Adsense<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/clickjacking-campaign-abuses-google-adsense-avoids-ad-fraud-bots\/' title='Clickjacking campaign abuses Google Adsense, avoids ad fraud bots'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10499,4503,10526,10527,10528,1670,10529,10530,10531,3764],"class_list":["post-5868","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ad-fraud","tag-cybercrime","tag-doubleclick","tag-ek","tag-exploit-kits","tag-google","tag-google-ads","tag-google-adsense","tag-malvertising","tag-malware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5868","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=5868"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/5868\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=5868"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=5868"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=5868"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}