Botnet use in click fraud skyrockets

Share this article:

Increasingly, click fraud seems to be underpinned by botnets, according to a report from Click Forensics, an online advertising auditing service.

In fact, botnets accounted for nearly 43 percent of all click fraud in the third quarter of this year, the study, released Thursday, found.

This was a big jump in the use of botnets, marking a doubling in two years, and an increase of 27.5 percent over the same quarter last year.

One botnet, a highly sophisticated click-fraud network of zombie computers dubbed the "Bahama botnet," was implicated in a recent scareware incident involving NYTimes.com display ads. The source of that attack was traced back to the Ukrainian Fan Club, a known group of online fraudsters, which redirected traffic through 200,000 parked domains located in the Bahamas.

Click fraud involves a person, or script, clicking on an ad repeatedly to drive up countable hits that are paid for by unknowing advertisers.

“Botnets perpetrating click fraud and other online schemes continue to grow in number and sophistication,” Paul Pellman, CEO of Click Forensics, said in a statement. “Advertisers and ad providers need to be especially vigilant about such activity as we enter the competitive search marketing holiday season.”


Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Florida Supreme Court rules warrants a must for real-time cell location tracking

Florida Supreme Court rules warrants a must for ...

The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger ...

The modular malware was named "Ventir," by researchers at Kaspersky.

Fake Dropbox login page nabs credentials, is hosted on Dropbox

Fake Dropbox login page nabs credentials, is hosted ...

Symantec researchers received a phishing email linking recipients to a fake Dropbox login page that is hosted on Dropbox's user content domain and served over SSL.