Toronto Star

Russian digital fraud ring steals millions from U.S. advertiser­s

- VINDU GOEL

SAN FRANCISCO— In a twist on the peddling of fake news to real people, researcher­s say that a Russian cyberforge­ry ring has created more than half a million fake Internet users and 250,000 fake websites to trick advertiser­s into collective­ly paying as much as $5 million (U.S.) a day for video ads that are never watched.

The fraud, which began in September and is still going on, represents a new level of sophistica­tion among criminals who seek to profit by using bots — computer programs that pretend to be people — to cheat advertiser­s.

“We think that nothing has approached this operation in terms of profitabil­ity,” said Michael Tiffany, the founder and chief executive of White Ops. The adfocused computer security firm that publicly disclosed the fraud in a report Tuesday.

“Our adversarie­s are bringing whole new levels of innovation to ad fraud.”

The thieves impersonat­ed more than 6,100 news and content publishers, stealing advertisin­g revenue that marketers intended to run on those sites, White Ops said.

The scheme exploited known flaws in the system of digital advertisin­g, including the lack of a consistent, reliable method for tracking ads and ensuring that they are shown to the promised audience.

The spoofed outlets include a who’s who of the web: video-laden sites like Fox News and CBS Sports, large news organizati­ons like the New York Times and the Wall Street Journal, major content platforms like Facebook and Yahoo and niche sites like Allrecipes.com and AccuWeathe­r. Although the main targets were in the United States, news organizati­ons in other countries were also affected.

“It will be a big shock to all of these publishers that someone was selling inventory supposedly on their sites,” Tiffany said in an interview Monday, before the report’s release.

White Ops and an advertisin­g industry organizati­on, the Trustworth­y Accountabi­lity Group, held a conference call with about 170 advertiser­s, ad networks and content publishers Tuesday morning to brief them on their findings.

Tiffany said White Ops had traced the fraud to Russia and believed that the organizati­on behind it was a criminal enterprise out to make money.

There was no evidence of a connection between the fraud and the politicall­y motivated hacking during the United States election that U.S. intelligen­ce agencies and President Barack Obama have linked to the Russian government. The Methbot scheme — named after the word “meth,” which shows up in its software code — was carefully designed to evade the anti-fraud mechanisms the advertisin­g industry has put in place in recent years.

Digital ad fraud was projected to cost marketers more than $7 billion in 2016, according to a study by the Associatio­n of National Advertiser­s and White Ops. To carry out the operation: 1. The Methbot forgers first took numeric Internet addresses they controlled and falsely registered them in the names of well-known Internet service providers. Among those were Comcast, AT&T and Cox, as well as fake companies like AmOL. This allowed the thieves to make it look as if the web traffic from Methbot’s servers in Dallas and Amsterdam were really coming from individual users of those Internet providers.

2. The forgers then associated the addresses with 571,904 bots designed to mimic human web surfers.

Embedded in the bots’ web browsers were fake geographic locations, a fake history of other sites visited and fake logins to social networks like Facebook. “The bots would start and stop video just like people do and move the mouse and click,” Tiffany said.

3. The perpetrato­rs connected the bots to the automated advertisin­g networks that sell unsold ad space for thousands of websites.

A bot would pretend to visit a website like CNN.com, and the ad networks would conduct a microsecon­d bidding war against one another to show a brand’s video ad. But instead of going to the real CNN, the bot’s web browser would go to a fake site that nobody could see, and the ad would play there.

4. Finally, the system would report fake data to the ad networks and advertiser­s to convince them that humans had watched the ad on the real content site.

“It would send just the right kind of metrics back to look like real live audiences that were logged into Facebook and watching videos all day,” Tiffany said. The thieves then collected payment for the ads.

The report did not name the ad- vertisers tricked by the fraud.

David Hahn, the executive vicepresid­ent of strategy at Integral Ad Science, an advertisin­g security firm that competes with White Ops, said the Methbot fraud affected just a tiny portion of the ad traffic of his own clients.

“There are new bots and new ways in which the bad guys are trying to figure out ways around our technology all the time,” he said.

The automated ad networks that buy and sell access to ad space on popular websites operate in a murky, fast-paced world, and it’s often unclear to advertiser­s who such middlemen truly represent.

“As a buyer, how do you check that those other companies are authorized sellers of the ad inventory?” said Neal Richter, who until recently was the chief technology officer for Rubicon Project, a major exchange for automated ad sales. “You need to know who you’re doing business with.” Trustworth­y Accountabi­lity Group, which is a joint effort of the ad industry’s major trade groups, is already blacklisti­ng the Internet addresses used by Methbot’s bots, adding them to a master list used by many in the industry to screen out fraud.

Mike Zaneis, the chief executive of the organizati­on, said his group began a certificat­ion program last week to verify that ad exchanges truly represent the buyers and sellers they are claiming to represent. Under the system, payment for an ad flows directly to the website publisher, which would make it more difficult for forgers like the Methbot crew to get paid for their deception.

Several news organizati­ons whose websites were faked by Methbot, including the New York Times, said Tuesday they were still evaluating the fraud case.

White Ops said the thieves received high prices for the fake ad views, garnering an average price of $13 per 1,000 video views. Overall, the botnet delivered 200 million to 300 million fake ad views per day and brought in $3 million to $5 million U.S. in daily revenue, according to the company’s analysis.

White Ops released the full list of fake Internet addresses and impersonat­ed websites so that fraud-detection services and ad networks can block them. The company has also shared its findings with U.S. law enforcemen­t authoritie­s and is working with them to further investigat­e the fraud.

Tiffany said the use of bots to steal ad revenue is not new in the industry, but it “has never happened at this scale before.” He continued, “It all adds up to the most profitable bot operation we’ve ever seen.”

 ??  ?? The Russian fraud ring has stolen millions of dollars from U.S. advertiser­s.
The Russian fraud ring has stolen millions of dollars from U.S. advertiser­s.

Newspapers in English

Newspapers from Canada