In this article (click to jump to the section):
Fraudulent traffic has always been a major pain point of the adtech industry. Of course, it’s expected that using non-physical data products leaves ample room for manipulation. This is because it entails working at a high scale without the possibility of verifying every user’s existence.
The industry puts a lot of effort into combating fraud, but fraud methods evolve simultaneously and become more intricate to overcome newly developed fraud prevention solutions.
The adtech industry’s losses due to fraudulent traffic are estimated to reach $100 billion in 2023, according to Juniper Research—and that number is rising. Industry experts estimate that fraudulent installs account for 31% of iOS and 25% of Android app installs.
The major types of ad fraud in the mobile industry are:
As a veteran adtech product company with over 10 years of experience, our goal is to provide value and become a partner to our clients rather than being just another service provider. That’s why we listen to our customers and proactively address their concerns.
Multiple clients in the APAC region have raised concerns about how much trust to put in the UA costs they have seen from some partners. And while the numbers were strong and keeping the companies’ stakeholders happy, we sensed that something was off as they seemed far from being realistic.
The investigation run by our product and analytics team revealed an unprecedented amount of click spam by several of the key user acquisition partners.
While the amount of click spam has decreased in Western countries1, its presence remains strong in some regions, including APAC. The problem is still seen in emerging markets, and the industry should prioritize addressing the issue as it affects multiple stakeholders.
Click spamming, sometimes referred to as click flooding, is a fraudulent traffic activity that abuses the loophole of the “last touch” attribution model. Fraudsters open multiple app store2 pages on real users’ devices without them knowing (or seeing the ad or the store page) and attribute an install that might theoretically happen organically in the next seven days. During this attribution window, as long as the “click” from the fraudster’s source was the last one, MMPs will assign the install to the fraudster.
In other words, if a user whose device was abused downloads the app organically while the attribution window is still open, the install is attributed to the fraudster.
There are a few relatively simple steps that fraudsters follow to run click spamming at scale:
Click spamming works on assumption, and it targets apps that are likely to be installed organically by large groups of users. These are typically apps that rank high on charts, are top grossing, offer new services, are popular among new device owners, and more.
As click spamming tends to bring the CPI (cost per install) significantly lower than legitimate paid sources and sometimes produces higher engagement rates (by simply cannibalizing the organic traffic where users have high intent of using the app), companies providing this type of fraudulent traffic have higher chances of becoming the main user acquisition partner.
Let’s look at the real case of a Delivery vertical in India that our team examined. A fraudulent partner was bringing 25,000 installs per day and reporting 100,000,000 (100M) clicks per day, purposefully hiding the impressions (which otherwise would have been hardcoded). This didn’t draw the UA manager’s attention because the fraudster was a reputable company included as a top-performing company in one of the MMP’s reports.
Our first examination revealed an abnormal Click-to-Install CVR (conversion rate) of 0.025% (with an industry benchmark of around 1-2% depending on the app type and app vertical). The abnormal CVR raised a red flag and drove us to investigate further.
What we found is that trying to reverse engineer these numbers makes the performance anecdotal:
An important aspect of the programmatic mobile adtech industry is that all the Tier 1 SSPs (supply-side platforms) that provide high-quality traffic work on the CPM model exclusively.
Having a CPI (cost-per-install) or CPA (cost-per-action) agreement between a service provider and an advertiser is not unheard of (this actually happens quite a lot). Advertisers, thinking that they’ll only pay for installs or actions, feel that their budget is secured for growth.
In the case mentioned above, at a CPI of $0.1 per install with 25,000 installs daily, the daily campaign budget is $2,500 while the real daily budget of a campaign of this scale should have been $200,000.
What feels like huge savings is actually a budget loss.
The example above reflects the actual scale of the click spamming for a single mobile app on one of the biggest markets. Of course, not all the fraudulent traffic companies leave such apparent traces—in some cases, the scale can be more modest3. However, the number of clicks opening multiple attribution opportunities and Click-to-Install CVR should always attract the attention of a UA manager.
The problem of click spamming of this scale is much larger than that of the leaking budget alone. When the yearly marketing performance budget (along with the business plan and investor report) is built based on the results of the seemingly “best UA source,” this creates the vicious cycle of dependency on that traffic source.
Let’s see how click spamming affects multiple stakeholders.
As multiple other traffic sources are having a hard time competing with the fraudulent UA traffic source in terms of both UA cost and engagement, the dependency on the fraudster company is growing.
On the macro level, the success of click spammers (and the fact that both clients and MMPs allow it to happen) affects the entire mobile industry. The ball keeps rolling for the click spammers as they have a higher chance of getting featured on MMPs’ performance indexes due to the methodologies used (and flying under the fraud protection suites’ radar):
Another important aspect of the due diligence process is asking the right questions: Discovering partners’ traffic sources and how they access this traffic might be the key. The “secret sauce” in adtech is always a technology behind, so secrecy in the aspects mentioned should raise suspicion.
Unfortunately, due diligence alone is not enough to prevent fraudsters from taking over the budget. As mentioned before, some fraudsters in our case study were included in the industry’s performance rating.
Notes:
1 While the amount is lower in Western countries, it still exists due to the negligence and ignorance of buyers who let it happen. However, Western companies’ policies are normally stricter and include processes to ensure that due diligence is in place. Back ⤴️
2 We intentionally don’t specify the device type or the store, as click spamming equally affects Android and iOS apps. Back ⤴️
3 Modesty, however, is not a common trait of click spammers. Since fraudsters need to increase the probability of install, they must target more devices to open more attribution windows. Back ⤴️
4 One of the biggest MMPs—Adjust—tried to push the initiative not to attribute sources that don’t send impressions. Sadly, they later decided not to enforce it. Back ⤴️