Your source for everything mobile UA, from the basics to contentious standards, the glossary can help and inform both aspiring growth managers and experienced mobile app developers
Fraud prevention
Attribution Manipulation – Click Spamming and Click Hijacking -> Page 1 of
Attribution Manipulation – Click Spamming and Click Hijacking
When it comes to fraud in mobile marketing we think it’s important to understand which vulnerabilities each fraud technique abuses, how it works, what are its consequences, and how it can be detected.
In the subject of attribution manipulation we’ll focus on two opposing types of fraud that both revolve around the abuse of the way attribution technically works (i.e, by faking attributed installs by taking over organic or other paid installs).
Click Spamming in Mobile Marketing
How Does Click Spamming Work?
Click spamming is a technique that abuses the last touch attribution model in order to “steal the credit” for an install. The most commonly used attribution model is ‘last touch’, in which the latest UA partner who was attributed with a click on the ad that preceded the install will be attributed with the install, assuming the attribution window is still open. In short, the last click on an ad before the install will be credited for the install.
Click spamming happens at the time of an ad impression. It can be an in-app banner ad or a pixel “ad” on a webpage. Once there’s an impression, the ones conducting the fraud trigger a series of clicks (20 or even 30 clicks), as if there were multiple ads being displayed to a single user and all of them were clicked. This process is called ad stacking.
In the next stage of the process, the app store opens. Since the ad wasn’t originally clicked by the user, this happens in the background without the user’s knowledge, and all of these clicks are registered for future attribution purposes, but there’s no install, yet.
Click spamming works on assumption, and targets click to apps who are likely to be installed organically by large groups of users (apps who have a buzz around them, new services, apps that new devices tend to install, and more).
What happens eventually is that users install after the ad was ‘clicked’, and the spammer gets attributed for the install. It’s guesswork, but imagine the probability of running 20 to 30 different clicks (for popular apps) per a single impression. You’re bound to ‘win’ some installs.
The Collateral Damage of Click Spamming
Click spamming hurts almost all sides involved in the ad serving process – the advertiser, legitimate UA partners (ad networks and DSPs), and the users.
The Advertiser:
If your app is the targeted app (i.e, you’re it’s advertiser), it means you end up paying for your organic installs. One of the most infamous cases where a company claimed they’ve been paying for organic installs is Uber, in the case of Uber vs. Fetch.
Fetch was Uber’s ad agency, which means they hired and handled the ad networks that ran Uber’s paid ad campaigns. Uber claimed that Fetch hired ad networks who used click spamming, resulting in Uber paying, both Fetch and the ad networks, for installs that were attributed to the ad networks, but in reality originated in organic installs.
Fetch, on the other hand, claimed they work tirelessly to minimize fraudulent activity and that Uber’s invoices went unpaid for months.
While there seems to be some additional tension between these two companies, click spamming is a well-known issue in the industry, one any UA and Growth manager should be aware of.
According to a report by AppsFlyer, $20.3B in ad spend was exposed to app install fraud in the first half of 2019 with 22.6% of non-organic app installs globally are currently identified as fraudulent.
A Negative Effect on Store Ranking:
An app store ranking is decided based on multiple factors that differ between the stores. One of the deciding factors is the ratio between store visits to installs, if the conversion rate is lowered over time (i.e, a lot of users open the store but only a few download the app) the store’s ranking will decrease. If your app is subject to click spamming this means that even your store ranking will be negatively affected.
The UA Partner (Ad Networks and DSPs):
The second party to get hurt by this technique is the trusted UA partners. A partner that ran an honest, fraud-free campaign might have been losing it’s view-through attribution window (an impression that preceded the install) to click spammers.
View-through attribution windows are significantly shorter so as to only be counted when they can actually be considered to have led to an install. If a click occurs while a view attribution is still open the click “wins” the attribution (even if the impression occurred closer to the install). This means that even if the impression from the trusted ad network led to the install, the click (that occurred without the user’s knowledge or intention) will be attributed for the install.
The Users:
For some users, data plans are billed by usage (instead of a monthly package). This means that in devices that are subject to click spamming, the increase in data usage will be costly since opening the app store for 20 clicks per ad takes a fair amount of data usage, for people whose data is a limited resource, click spamming can lead to a lot of frustration, as it can’t be easily ascertained that it even occurred.
How to Recognize Click Spamming
There are a couple of KPIs that should be tracked and monitored to rule out click spamming.
In click spamming, the conversion rate (click to install) will be low, and in many cases extremely low (0.01%-0.05%) since there will be a whole lot of clicks but a relatively minuscule amount of installs. In past occurrences where we helped our partnered advertisers detect click spamming, we saw examples like ~2,000,000 clicks and ~300 installs (0.015%), and the conversion rates were sometimes even lower.
The CTIT (click time to install) will be longer. There are benchmark CTIT to compare to, but our recommendation is to take them with a grain of salt. Benchmarks vary between apps, and the best thing to do is to compare it with other campaigns for your own app if you can.
And lastly, in click spamming, as soon as a new click spamming ‘source’ is added to your buying, you’ll see a decline in your organic installs, because, at the bottom line, those are the installs that click spamming targets and hurts the most.
Click Spamming in a LAT (Limited Ad Tracking) Environment
A LAT environment makes fraudsters’ life easier, since attribution tracking relies on fingerprinting, instead of relying on device IDs, rendering it probabilistic as opposed to deterministic. If click spamming is executed on a device with LAT enabled, anyone on the same IP address who organically installed the app will end up attributing the fraudster with an additional install.
The lack of a deviceID in a LAT environment makes it harder to track the connection between a click and an install. Having a lot of devices on the same IP address and tracking an already popular app, means it might have just been installed organically by a different device than the one with the open click attribution window.
Without click spamming, fingerprinting is estimated to be 98% accurate when the time between the click to the install is 10 min or less, but as time passes the likelihood that the click and install actually originated from the same device, decreases.
“As the time between click and conversion increases, fingerprint attribution becomes increasingly inaccurate. After three hours, accuracy drops by 85%. At the 24-hour mark, it drops to 50%; and beyond that, fingerprint attribution is more likely wrong than right.”
Grant Simmons, VP @ Kochava Foundry, “Your Attribution May Be More Wrong Than Right
Keeping in mind the inaccuracy in fingerprinting (especially the longer the CTIT is) and adding click spamming, means UA managers need to be especially careful and monitor their LAT sources, always suspect inflated click volumes, and have a minimal understanding of how those sources generate these clicks.
As an advertiser, a good precaution would be to limit your fingerprinting attribution window to decrease the chances of click spamming in a LAT environment. Granted, this is hard to detect, but if your UA partner runs both LAT and non-LAT in-app campaigns and in both cases can’t provide you with device IDs, it should raise your suspicion and lead to further questioning, as there are very little (if any) legitimate reasons to not use deterministic attribution where it’s available.
Click Hijacking (AKA Click Injection) in Mobile Marketing
How Does Click Hijacking Work?
Click hijacking differs from click spamming significantly. It can only occur in-app, the hijacker has to have it’s code natively on the device (either through an app or an SDK), and it’s much more targeted in its nature. While click spamming is about sending massive amounts of clicks for different apps hoping to catch a few, click hijacking is very specific and hijacks already-clicked ads.
Once the infected user clicks the app store button to install an app (whether he got there organically or through a paid click), the fraudster recognizes it, checks if he has access to a campaign promoting the app that’s about to be installed, and hijacks the click, resulting in the fraudster being attributed with the install.
The vulnerability that’s taken advantage of in click hijacking occurs much earlier compared to click spamming and comes from the core – the app stores. When a new app is submitted to the app store it must go through a review process/ approving new apps to be added to the store.
So far, some fraudsters were able to pass this barrier on both platforms, but in an ideal world, more thorough testing would be done at this stage, and hopefully all, apps containing malicious software would be detected and banned.
The Rube Goldberg Effect of Click Hijacking
One by one, several different aspects of the advertiser’s UA efforts are affected. First, click hijacking hurts the app developer in a very clear and deliberate way, similarly to click spamming, organic installs are written off as paid installs which means the advertiser is paying for something he already owns., but there’s more to it. It completely obstructs setting the app’s marketing KPIs. The fraudsters’ results might look good on paper, but it won’t represent actual performance, and will simultaneously hurt other partners’ performance.
If other UA partners are targeting relevant users for your app, but are not successfully converting them (since those installs are being hijacked), their performance report is off as well. Their campaigns are underperforming, their CAC (customer acquisition costs) are higher, and they’ll try to optimize and improve while running on false, manipulated data.
This leaves advertisers confused. The fraudulent campaign will thrive while the non-fraudulent will underperform (since those installs are hijacked). If the underperforming campaigns are paused, the fraudulent campaign will see a decline as well (since the performance of the hijacked campaign is directly reliant on the work of other campaigns), but might still not clear the air and reveal the hijackers.
Whether or not it’s done consciously, the ‘host’ app (which enables click hijacking) gains from this fraud. As many installs are generated for the ad placements inside it, as the hijackers usually only trigger their malicious code in some percentage ratio of all impressions (something like 1/10 or 1/15 impressions is hijacked, for example), it can still be labeled by legitimate bidders as a prime ad placement for user acquisition, which means it would get higher CPM bids for its inventory.
How to Detect Click Hijacking?
In click hijacking, your CR will appear to be high (since these users are prequalified), while the CTIT would be low (since the hijacker is attributed with the click right before the install occurs). If your attribution platform offers some form of user journey tracking you’ll notice the fraudulent company constantly popping up between other UA partners and their installs.
A famous case of a malicious SDK is the Chinese company Mintegral that allegedly disguised itself as a tool to help app developers and advertisers monetize their apps ‘effectively’ with ads. It was discovered that the SDK allegedly had malicious code within it that worked to steal potential revenue from other ad networks.
Mintergal made it harder to detect their alleged fraudulent activity. Instead of supposedly hijacking the attribution of all the clicks, they would only hijack one out of ten, making it seem like an ordinary ad network activity.
Another case that was made famous back in 2018, named two Chinese companies – Cheetah Mobile and Kika Tech. In the article published by Buzzfeed, it was claimed that these companies used their SDK across different, self-owned, wildly-popular apps in order to perform click hijacking.
Their activity was discovered by Kochava’s attribution platform.
How to Detect Click Hijacking?
If you have cause to suspect click spamming or hijacking from a new UA partner, take a better look at your campaigns’ ad placements. Both of these attribution manipulations tend to use ‘hardcoded placements’.
If your data indicates a few repeating well-performing placements over long periods of time, it might be hardcoded and fraudulent. In reality, many new ad placements are created on a daily basis as new apps are released, and you should expect a healthy dynamic nature in the placements that are prominent for your UA campaigns in the in-app ecosystem. In some cases, in click spamming, the ad placement will indicate an app that doesn’t even run ads, so double-check for that as well.
The Ramifications of Raising Capital Under Falsely Calculated CAC
Monitoring your campaigns under falsely calculated CAC is a problem in and of itself, but the issue is much bigger when it involves investors, people outside your organization, operating under false assumptions regarding the app’s growth potential.
When your app’s paid acquisition data consists of many organic users falsely claimed as acquired ones, your costs seem lower than they actually are, and funds raised under these assumptions won’t pay themselves back over time, as the growth potential of the product itself isn’t what it seems to be.
This means that if you’ve raised capital, your app grew, your team grew, and your acquisition investments grew as well, but in the end, the expected results weren’t delivered and the investment was deemed to be a failure.
In the worst-case scenario, this will result in new hires being laid off, shrinking teams back down, losing not only the funding, but the trust of the investors, which will also lead to negative public coverage, and more.
An app with actual potential can still be a victim of mobile fraud, and though it had everything it needed to become a success, the mishandling of UA in the early stages of the app could’ve hurt in an irreparable way.
How to Avoid Click Spamming, Click Hijacking, and Other Fraud Techniques
• Due Diligence – ask your UA partners the hard questions – how they target, ask to learn more about how their SDK works, and their ad units, and get familiar with their process. In this day and age offering transparency is basic and DSPs should be able to make their information accessible to the advertiser. Not getting definite, clear answers should raise a flag.
• Adjust Your KPIs – make sure your organization is setting the right KPIs for the UA campaign. Some organizations are still focusing on volume instead of quality (i.e install volume vs. active and engaged users, depositors, etc’.) By focusing solely on volume and not testing the quality of the users, you essentially attract possible fraudulent activity to your app and hurt the overall performance of your app (getting a lot of new users who open once and never come back means lower retention rates.)
• Monitoring and Tracking – Keeping track of your user base, shifts in the percentage of organic and paid users, shifts in overall app performance, etc’ can serve as great indicators of malicious activity. In both click spamming and click hijacking you’ll see a decline in organic installs. Though a more substantial hit in organic installs will most likely be detectable in click spamming.
Choosing Your Partners
Since these are attribution-related manipulations there are two key partners who can help avoid, prevent, track, and recognize the fraudulent activity.
Different attribution platforms offer different tools to track fraud and notice abnormalities in the data. Taking the time and choosing the right attribution platform for your app can help with the early detection of fraud.
Choosing a trusted and reliable DSP. Our glossary entry choosing a DSP covers the different types of DSPs and which mobile growth opportunities they offer. Adjust also wrote extensively about choosing a DSP.
As we’ve mentioned before, as we steer further from ad networks and transition to programmatic and ML-based campaigns, transparency is a basic expectation from a UA partner.