Methbot

Methbot was an advertising fraud scheme.

History

Methbot was first tracked in 2015 by cybersecurity firm White Ops, and the botnet saw rapidly increased activity in 2016.[1] The botnet originated in Russia (though it was not state sponsored),[2] and utilized foreign computers and networks in Europe and North America.[3] The infrastructure consisted of 571,904 dedicated IPs,[4] 6,000 domains, and 250,267 distinct URLs, each of which could only house a video ad, and used variants of the names of famous publishers to fool those looking into the domains. This led the operators to game the system, leading ad selection algorithms to select these fake web pages over larger corporate pages from legitimate companies, and charge advertisers at a premium. About 570,000 bots were used to execute clicks on those websites, “watching” up to 300 million video ads a day[1] while the bots mimicked normal computer user behavior.[5] Estimated clicks per day generally reached between 200 and 300 million per day.[6] The botnet relied on data servers instead of more traditional botnets that rely on infected PCs and mobile devices.[4]

At its peak, Methbot was making its operators—which were dubbed the Ad Fraud Komanda—up to between three and five million dollars per day[1] for between $180 million[7] and $1 billion dollar in losses to the ad industry,[8] while some other estimates were nearer to half a million per day.[9] At the time, it was the largest and most profitable ad fraud network established, before it was discovered in late 2016.[10]

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.