Click fraud botnet defrauds advertisers up to $6 million

The 'Chameleon' botnet generates high traffic on low-quality websites
  • Jeremy Kirk (IDG News Service)
  • — 20 March, 2013 00:55

An advertising analytics company said it has discovered a botnet that generates upwards of US$6 million per month by generating bogus clicks on display advertisements.

Spider.io, based in the U.K., wrote that the botnet code, called Chameleon, has infected about 120,000 residential computers in the U.S. and perpetrates click fraud on 202 websites that collectively deliver 14 billion ad impressions. Chameleon is responsible for 9 billion of those impressions, Spider.io said.

Click fraud cheats Web advertisers by making them pay for clicks on ads that are not legitimate, depriving them of customers and revenue. Spider.io said advertisers pay an average of $0.69 per one thousand impressions.

Spider.io did not identify the publishers of the websites that the botnet targets. But online media buyers have been noticing inconsistencies for some time on websites showing display ads for large companies. Andrew Pancer, chief operating officer of Media6Degrees in New York, said his company stopped buying ad inventory on thousands of sites last year.

The blacklisted sites reported very high traffic numbers even though some would not even turn up in a search, said Pancer, whose agency buys ads for companies including AT&T, HP and CVS Pharmacy.

"You've never heard of these sites," said Pancer, who said many of the sites share the same cookie-cutter templates.

Media6Degrees shared its findings with Spider.io, which then discovered a botnet it calls "Chameleon." The botnet is engineered to visit multiple pages on multiple websites at a time, clicking on ads the way a real person would. But despite at times looking like unique traffic, Spider.io wrote that the botnet traffic as a whole looks homogenous.

"All the bot browsers report themselves as being Internet Explorer 9.0 running on Windows 7," Spider.io wrote on its blog.

Chameleon puts a heavy load on a user's browser and can cause a browser to crash and restart. If it crashes the browser, Chameleon restarts another session.

Pancer said some of the suspect sites include Toothbrushing.net, which was reporting millions of views per month. Media6Degrees stopped buying inventory through companies such as Alphabird due to concerns over the source of their traffic, Pancer said. Alphabird, which has offices in the U.S. and Australia, could not be reached for comment.

Pancer said some publishers may have inadvertently partnered with questionable agencies to supply poor quality traffic to their sites. He said it is still early days for ad exchanges, which are highly automated and have a "wide margin for gaming the system."

"I'm so happy we are finally able to get in front of this," he said.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Tags: Spider.io, advertising, security, internet, fraud

Coding error protects some Android apps from Heartbleed

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

SECURE Email Gateway

Clearswift SECURE Email Gateway is an effective and resilient email gateway for 50 to 50,000 users.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.