You are on page 1of 24

The bad, the ugly, and the

truth of mobile ad fraud


Mobile ad fraud is a problem that Adjust has been fighting
for a long time.

Ad fraud can decimate ad budgets, skew data, and create a feedback loop that’s a race to the
bottom. On average, 4% of an app’s paid user acquisition budget is taken by fraud. We’ve seen
outliers with up to 90% of budgets stolen - and our Fraud Prevention Suite has so far rejected
400,000 installs (not including 200,000 SDK signatures) - around $2m per day in saved budgets.

With our fraud prevention suite, we were the first in the industry to take fraud seriously, and
the only attribution service to take it on proactively. As mobile fraud grows more sophisticated,
we've strived to educate marketers on the dangers of mobile fraud. This expert's guide is one of
a number of ways we can help you find out more about this pressing issue.

Here, we highlight five sources of mobile ad fraud; identifying what they are, how they work,
what and damage they can do to your mobile campaigns, datasets, and more.

This guide will help you identify, and get closer to solving, tangible problems faced by all mobile
companies. Fraud is a deep-seated issue, and something which the entire industry needs to face
up to before it can be dealt with. Education is the first step in getting rid of it for good.

2
Table of contents
SDK Spoofing __________________________________________ 4
How SDK Spoofing works ___________________________________________________ 5
The evolution of SDK Spoofing ______________________________________________ 5
Adjust’s SDK Spoofing solution _______________________________________________ 6

Click Injections _________________________________________ 7


What does this mean for marketers? _________________________________________ 8
Let’s talk about “Install Broadcasts” ___________________________________________ 8
A common misconception on how to deal with this type of fraud _____________________ 9
A new level of sophistication ________________________________________________ 11
How Adjust deals with Click Injections _________________________________________ 11

Click Spam ____________________________________________ 12


How Fraudsters poach organic users __________________________________________ 13
The impact of Click Spam ___________________________________________________ 14
Fighting Click Spam ________________________________________________________ 15
Removing spammers from the data set ________________________________________ 15

Fake Installs ___________________________________________ 16


How Fraudsters take advantage of data centers ________________________________ 17

Fake In-App Purchases __________________________________ 18


Understanding Fake In-App Purchases _________________________________________ 19
The impact of Fake In-App Purchases _________________________________________ 19
Fighting back against Fake In-app Purchases ___________________________________ 20
Choosing the right approach _________________________________________________ 21
Filtering Fake In-App Purchase data ___________________________________________ 21

A call to arms _________________________________________ 22

3
The TL;DR

Install characteristics: The users


aren't real, and the engagement is
completely fake.

Signs you're at risk: If the SDK


version and app version of installs
coming through don't match the
latest version you've released.

How to fix it: Adjust's SDK


signature

* WARNING *

* FRAUD DETECTED *

SDK Spoofing
SDK Spoofing (also known as ‘replay normally more active and spread out than
attacks’) is a type of fraud that generates fraud perpetrated en masse in a single
legitimate-looking installs without any real location.
installs occurring, in order to steal from an
advertiser’s user acquisition budget. The scheme originates from fraudsters
simulating installs via data centers. It’s
SDK spoofing is hard to spot. This is because challenging enough for them to pull off, and
fraudsters utilize real devices, which are requires them to consistently create new IP
addresses to keep their fraud secret.

4
How SDK Spoofing works
In order to perform SDK Spoofing, a fraudster like shared secrets, event tokens, etc) and
has to break open the SSL encryption between experimenting with the dynamic parts, which
the communication of a tracking SDK and its include things like advertising identifiers.
backend servers, typically done by performing
a ‘man-in-the-middle attack’ (MITM attack). These days, with callbacks and near real-
time communication detailing the success of
After completing the MITM attack, fraudsters installs and events, the perpetrators can test
then generate a series of test installs for an their setup by creating a click and matching
app they want to defraud. Since they can read it to an install session. If it’s successfully
the URLs in clear text format, they can learn tracked, they know they’ve nailed the logic.
which URL calls represent specific actions As such, SDK Spoofing is simple trial and error
within the app, such as first open, repeated with only a couple dozen variables.
opens, and even different in-app events like
purchases, or leveling up. They also research Once an install is successfully tracked, the
which parts of these URLs are static and which fraudsters will have figured out a URL setup
are dynamic, keeping the static parts (things that allows them to create fake installs.

The evolution of SDK Spoofing


At the very first signs of this new type of but that does not mean that the app being
fraud we began recording, researching and exploited for data is itself malicious. The
took defensive steps. The fastest way for perpetrator’s app might have a very real
us to take action in the short term was to purpose or it might be someone else’s legit
release hotfixes to our attribution, removing app and the perpetrators simply have access
spoofed install data based on faulty use of our to it by means of having their SDK integrated
parameter structures that did not match the within it.
intended purpose.
This could be any type of SDK from
Fraudsters had a lot to lose, so they pushed monetization SDKs to any closed-source
the bar in terms of their level of sophistication, SDK where the information being collected
evolving to match our measures. Fraudulent isn’t transparent. Regardless, fraudsters
device data started to match data from real- have access to apps that are being used by a
device traffic and became consistent over a (favorably) large amount of users.
multitude of device-based parameters (and,
later, all device-based) parameters. How was Having a source that generates real device
this possible, if everything was fake? data makes the fraudsters' task simple. They
no longer need to randomize or curate troves
The simple answer is: not everything is fake. of data, because they have access to the real
The fraudsters can collect real device data. thing. This has made it difficult on the anti-
They do this by using their own apps or by fraud side to research and identify these
leveraging an app they have control over. The spoofing attempts.
intent of their data collection is malicious,

5
Adjust’s SDK Spoofing solution
Releasing hotfixes to stop this threat became used once. In order to achieve a reasonably
increasingly difficult. In radical cases, we had secure hash and an equally reasonable user
to manually research hundreds of thousands experience for our clients, we opted for
of data points to prove that these installs an additional shared secret, which will be
were in fact fake, giving our clients a chance generated in the dashboard for each app the
to recuperate their lost budgets. Throughout client wants to secure.
this time, we worked on a solution that would
put a stop to this fraud scheme dead in its Marketers also have the opportunity to renew
tracks. secrets and use different ones for different
version releases of their app. This allows
To combat SDK Spoofing, we created a them to deprecate signature versions over
signature hash to sign SDK communication time, making sure that attribution is based
packages. This method ensures that replay on the highest security standard for the
attacks do not work, as we introduced a newest releases and the older releases can be
new dynamic parameter to the URL which removed from attribution fully.
cannot be guessed or stolen, and is only ever

6
The TL;DR

Install characteristics: The


users are real, and most likely
organic. However, fraudsters
have been known to steal the
last engagement from one of
the networks you're running a
campaign with.

Signs you're at risk: Attributions


to clicks after the user decided to
download the app

How to fix it: Leveraging Google


newest referrer API, and their new
“install_begin_time” timestamp,
which provides you with the
precise time of download.

AD

Click Injections
Click injections are a sophisticated form of click spam.

By publishing or gaining control over an Android app which utilizes the


Android OS’s “broadcasts intents” or the Android content provider to find
out when an install happens, fraudsters can detect when other apps are
installed on a device. Then, they can trigger a click right after the install
completes, and then the fraudster will receive the credit for (usually organic)
installs.

In other words, a fraudster uses an app to hijack the user’s device at just the right
time – and with just the right information – to create a legitimate-looking “ad-
click”, which then nets them CPI payouts.

7
What does this mean for marketers?
The scheme siphons off advertising budget With the introduction of fraud in marketing
that could have been used to reach more data, numbers-driven conclusions that
people. It also means that conversions result marketers reach are based on data that
in marketers believing that some paid contains inaccuracies, turning into a vicious
campaigns perform better with users than cycle of advertisers continuing to invest
they actually do. in advertising that’s relatively ineffective,
potentially diverting money from better-
placed and better-designed campaigns.

Let’s talk about “Install Broadcasts”


Every Android app broadcasts changes to the direct options to transfer into a specific web
device they’re installed on, including other browser, and so on.
apps. These status broadcasts are sent when
apps are downloaded, installed, or uninstalled. Any app can “listen in” on these broadcasts,
and it’s a system that fraudsters have learned
The feature is useful for creating a tight to exploit, finding out when apps are installed,
connection between different apps by and injecting themselves as the new source
allowing them to (for example) streamline for the install microseconds after a new app
logins with a deep link to a recently installed makes it onto the device.
password manager, or giving users more

8
A common misconception on how to deal
with this type of fraud
Industry-wide, it seems that the best way to fight click injection is to reject all attributions for
any install that happens within a few seconds after the click. The idea here is that it's actually
impossible to download and open an app (that is typically over 100MB in size) within such a short
amount of time.

5000
amount of installs

4000

3000

2000

1000

time in seconds

However, there are a few problems with this approach - namely, it doesn’t cover the content
provider exploit. So, let's look at the two defining KPIs for any filter: false positives and false
negatives.

Now, you say that false positives should be impossible since no one can download an app faster
than is technically feasible. But what about some edge cases? For example, if you restore your
freshly purchased phone with all of your former apps, and then proceed to open it for the first
time after clicking an ad, you will be counted as an install, (due to your new advertiser ID) with
only a few seconds between click and install. You also could have installed an app via the desktop-
to-mobile function and experience the same thing. Pre-installs, advertiser ID resets, and a couple
of other cases actually produce installs with impossibly short click to install times. On iOS, where
we are not aware of any click injection, we still see 1.4% of all installs made in the first 10 seconds.

It's fair to argue that if those are installs that should be rewarded the same as an authentic
new install, but are labeled as fraud, it would be a disservice to the advertisers. This, of course,
would be because app businesses would perceive networks or a sub-publisher as fraudulent even
though they have done nothing wrong.

9
How about false negatives? It turns out that this is where this approach really falls apart. To
explain, we need to understand (in detail) how click injection works. First, we split the user activity
into a few steps: tap on download button, app download completion, app install completion, and
app open.

The broadcast the fraudulent app listens to gets triggered once the app download is complete.
(Note that some of our competitors have devised filters that look at the timestamp of the first
app open.)

It's quite clear to see where the main issue lies: on one hand, there is always going to be a
few seconds between the download of the app and the time that the device has readied it for
usage. On the other hand, few users actually open apps within a few seconds of the download.
Depending on the size of the download, they may check their Facebook, or chat on Whatsapp,
and then open the new app a few moments later.

On iOS we can see that less than 10% of all users install within the first 10 seconds of the download
being completed. This means that we have a false negative rate around 90%.

0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 110 115

legitimately rejected false positives genuine UA installs false negatives click injections

By all measures, this has to be called a poor result and trying to fight click injections with this
rejection scheme will actually play into the hands of the fraudsters. This is because they will be
able to optimize their operation against the threshold, keeping 90% of the revenue intact all while
advertisers will not look further into the fraud scheme as they think they are protected. This is the
worst case scenario for anybody but the fraudster.

10
A new level of sophistication
There’s a second method by which scammers (through the PACKAGE_ADDED broadcast).
take advantage of the system. We conducted
an investigation into an app that was However, this way had a lot of flaws, mainly
suspected to be bypassing the default method that the timestamp between a completed
of click injections. To find it, we monitored install and the beginning of the download was
malicious apps to find out when they injected mismatched, which made it a very easy type
the clicks, and then reverse engineered those of fraud to detect.
apps to reveal their methodology.
So, instead, fraudsters managed to listen-in
In the past, a more straightforward method on newly-installed downloads before the app
was to listen for any newly installed apps, completed its installation. Fortunately, it’s
wait for a new app to be installed, and then something we caught wind of, and created a
run clicks. It was straightforward - Android new filter for (as we look into below).
provided an out-of-the-box way for an app to
know if a new app was installed in the system

How Adjust deals with Click Injections


At the end of 2017, Adjust released a new way Our click injection filter now denies the
of preventing click injections from affecting attribution of installs to sources that deliver a
our ad campaigns. This was only possible click in between the two available timestamps:
after Google switched to a new referrer `install_finish_time` and `first_open_time`/
API, and made timestamps that proved the `install`. This prevents click injection of both
user’s intent available for us to read. These varieties from touching anyone’s ad spend.
timestamps show what a user wants before
click injections intercepted the install.

11
Click Spam
The TL;DR
Organic installs have incredible value for app
businesses. They’re the users who download an Install characteristics: Real,
app without having interacted with any sort of organic users attributied from
advertisement, and have probably done so out of their dodgy `paid´ sources.
own interest, or through a recommendation by word-
of-mouth. Signs you're at risk: Paid
installs from certain sources
Organic users are generally higher quality than other behaving eerily similar to organic
users, tend to try apps for longer, and can have a counterparts. A flat distribution
higher lifetime value than their paid counterparts. of installs over the length of the
campaign. Low to extremely low
Tracking the number of organic users coming and going conversion rates.
from an app is normally a great way to understand the
overall health of an app. However, this changes when How to fix it: Distribution
fraudsters try to claim organic users as theirs. modeling.

Operating on the edge of acceptable practice,


unscrupulous publishers use shady techniques to
take credit for organic users, which means that
an app business can be tricked into overweighting
the importance of a fraudulent traffic source, and
also makes apps pay for users which installed them
organically.

This practice has two names: ‘organics poaching’ and


‘click spam’.

AD
AD
AD
AD

12
How fraudsters poach organic users
Organics poaching starts when a user lands on a mobile web page or in an app which a fraudster
is operating in. From there, any one of several kinds of fraud could take place:

• The mobile web page could be launchers, memory cleaners, battery


executing clicks in the background savers etc.)
without visible ads, or ads which can
be interacted with. • The fraudster could send impressions-
as-clicks to make it look as if a view
• The spammer could begin clicking has converted into an engagement.
in the background while the user
engages with their app, making it look • The spammer could blatantly send
as though they have interacted with clicks from made up device IDs to
an advert tracking vendors, or from retargeting
lists they got from other advertisers.
• The fraudster app can generate clicks
at any time if they run an app that is
running in the background 24/7 (e.g.

What unites these approaches is that a user is not aware that they’ve been registered as interacting
with an advert. In actual fact, they never saw anything.

As a result, the user may install an app organically, but a fraudster will claim they’ve seen an
advert – meaning the conversions will be attributed to a source that had nothing to do with the
install.

13
The impact of Click Spam

Click spamming is insidious because it captures It also has the potential to affect targeting
organic traffic and then claims the credit for decisions across the whole business. While
the user later. those organic users will undoubtedly be good
quality, their presence in the paid acquisition
This has a few profound effects on an cohorts will tempt a marketer to pay for
advertiser, the most obvious of which is that advertising in other channels that target
they pay for a user who was actually installed these groups. This is despite the fact that
organically. these groups might well download the app
in question without the prompt of an advert
Not only does this cost advertisers their spend, at all - meaning that the advertiser wastes
but there are a few more effects to this type time and money chasing users who could be
of fraud. First, and related to the previous reached in other ways.
point, the fact that the advertiser does not
know that they’ve paid for an organic skews a These investments will be made at the expense
number of interrelated metrics. of other channels. Campaigns that are largely
unblemished by fraudulent conversions won’t
It undercooks the number of organic users appear to be doing as well in comparison to
that the app is generating, which affects those populated by poached organics. The
both internal cohort analysis and downplays missing ROI on relatively fraud-free channels
the impact of marketing that could generate pose an opportunity cost to the advertiser:
organics such as ASO, branding and press when they could have invested sums chasing
outreach. These could have been potentially truly promising user cohorts, their budget is
cannibalized through click spamming. tied up with fraudulent channels instead.

Organics poaching also threatens the Click spamming might seem like a relatively
certainty of acquisition decisions too. If an small thing to deal with. But if it isn’t spotted
advertising network is claiming organic users, early, it can seriously pollute an entire app’s
and these users perform well within an app, attribution efforts - leading advertisers astray
the advertiser will likely decide to invest in and causing them to waste a significant
that channel to acquire more of the same amount of time chasing after users they’ve
type of users. This creates a circular problem, already acquired.
where the advertiser continues to pay
someone else for the users they’ve already
acquired completely naturally (or through
other marketing channels) until they realize
the mistake.

14
Fighting Click Spam
It’s impossible for advertisers to combat click spamming on the front line, as it’s down to publishers
to stop engaging in the practice.

However, advertisers can catch click spamming when it happens by looking for a simple pattern.
During our investigations into the problem, we discovered that there was a clear difference in the
way that genuine advertising clicks are distributed over time versus click spammers.

For a genuine traffic source, clicks are attributed with a normal distribution. The precise shape
and size of the distribution will vary, but the pattern from a trustworthy source is essentially a
hefty number of installs on hour one before a rapid tapering of performance.
Install count

Install count

Install count
Time after click Time after click Time after click

Display Marketing Click Spam Distribution Modeling

Sources of click spamming behave differently. Fraudulent installs are distributed flatly, because
the spammer can trigger the click but not the install. Therefore installs (and click to install times)
will follow a random distribution pattern.

This means that it is possible to weed out click spammers after the event. However, a better way
is to refuse to attribute installs to traffic sources which claim traffic with a flat distribution. This
is a proactive way which advertisers can use to fight back against spammers.

Removing spammers from the data set


Once an advertiser can identify spammers Instead of trying to eradicate the problem
they can begin to remove their influence. entirely at the source, businesses advertising
on mobile need to push back against
It’s very difficult to totally negate the effect of spammers with the help of attribution. The
spammers from a mobile marketing campaign. simplest step (on paper) is to refuse to pay
Networks try their best to remove spammers any spammer claiming traffic that matches a
from their offerings, but the scope and scale click spamming pattern.
of the mobile app ecosystem means there is
always the potential for a spammer to find
their way through.

15
The TL;DR

Install characteristics: As the name


implies – completely fabricated users
that only exist to trigger installs
based on fraudulent advertisements.

Signs you're at risk: A high level


of installs with instant drop-off
after the click.

How to fix it: Filtering targeted IPs


based on blacklisted locations.

Fake Installs
A fake install is a broad term that defines advertising revenue. Fake installs defraud
when a fraudster tricks an attribution partner everyone along the advertising chain - taking
into tracking an install that hasn’t taken place money away from advertisers, publishers and
on a real device, attributing it to a paid source. networks. On a traffic flow sample of over
400m installs over 17 days, we estimated that
To accomplish it, fraudsters use emulation $1.7m worth of installs were being paid to
software to fake installs in an effort to claim fraudsters faking installs.

16
How Fraudsters take advantage of data centers

Fraudsters use device emulation software The extraneous installs can also inflate the
to affect data centers. They do this by click-to-install conversion rates, potentially
programming scripts that make the emulator making certain channels appear to deliver
create a new random device with a fresh more value than they truly do.
advertising ID.
This can either lead the advertiser to
On that device, they create a user and have conclude that channels that include some
that user engage with advertisements. The degree of fraudulent conversions have more
emulated device will download the target positive ROI than other channels where all
app from an app store (or from local storage the users are legitimate. However, marketers
to cut down on traffic cost), triggering an could recognize that something strange is
install. Finally, the emulated device opens the happening and instead discard the channel
installed app, so it can trigger an install event, altogether, potentially losing out on the value
which is then transmitted to the attribution of the legitimate users from that source.
provider.
When it comes to a solution, we can rely
Sophisticated fraudsters might even go as far on one key insight: fraudsters will run these
as storing the session for later use, in order emulators in a data center, and typically
to create third or seventh-day retention by they’ll either route the traffic through the TOR
opening another session at the desired time. network or a VPN to “place” the conversion in
high-value markets.
The principle effect of fake installs on
an advertiser is that it introduces fake or In most instances, when a user downloads a
misleading data into the marketing funnel. mobile advert their smartphone’s IP should be
This issue goes beyond the lost spend which drawn from a pool of IPs associated with a
affects everyone. carrier (if they’re on mobile data) or with an IP
associated with an internet provider (of wifi).
This can cause the advertiser significant So, when a user’s IP is associated with a data
problems. Fake installs will, for example, center or an identity-masking server, such as
register as users who have immediately gone a proxy, VPN or TOR, it is likely that there is an
inactive after they’ve completed the install attempt to deliberately defraud the campaign.
(or reached the post-install quality goal). If
these installs are attributed but not identified IPs belonging to this type of locations,
as fake installs, then such behavior can begin known as “anonymous IPs”, can be filtered
to damage metrics, such as retention rates. from attribution to paid sources, preventing
This can drag down other metrics, such as them from polluting data sources. This will
lifetime value, and cause a rippling effect that prevent the majority of fraud associated with
damages numbers across the entire funnel. simulators before it begins and reduces the
impact of one datacenter manipulation tactic
significantly.

17
The TL;DR

Install characteristics: Potentially


high in-app spend, or frequent
purchases per user.

Signs you're at risk: Unmatched


purchase receipt codes.

How to fix it: Purchase


Verification.

Fake In-App Purchases


Up until now, we’ve been talking about fraud potential revenue they’re missing out on.
coming from fraudulent publishers. Fake in- However, the impact on a business isn’t just
app purchases are a bit different. Essentially, monetary. It’s also about how fake purchases
they’re an end-user issue, although they are (and the people who make them) damage the
still a form of fraud. successful operation of a free-to-play app.

Defined as an instance where an in-app Fake in-app spending is an ingrained and


purchase (or IAP) was made but no revenue widespread practice of global proportion,
was exchanged, Adjust figures suggest that whereby users who want to get ahead of
30% of attempted IAP spends on iOS are fake the competition (or gain extra content) take
- a sample based on millions of iOS devices. advantage of the app systems to do so.

The main concern from developers about fake


in-app purchases has been about how much

18
Understanding Fake In-App Purchases
With a typical purchase, an app should send a then pretends to be the man-in-the-middle
purchase receipt to the server of the app store store, sending back a fake receipt in its place.
provider. Once that receipt is sent, the store The app will be fooled since it receives what
then sends back another receipt to confirm looks like a valid receipt from what it thinks is
that the purchase took place. the real app store server.

In the simplest terms, if a purchase takes place Second, and more commonly, pirates hijack
then there should be a receipt. If it doesn’t the API call to send a fake receipt. By using
take place, there won’t be one. cracked code inserted into jailbroken or rooted
devices, the phone itself sends back a fake
Fraudulent purchases operate differently. First, receipt pretending to be the store. Though
there’s the man-in-the-middle technique. In precise details of how that takes place vary,
this instance, the app is tricked into sending a the key point is that the code fakes that all-
purchase receipt to a proxy server. This server important store receipt.

The impact of Fake In-App Purchases


The biggest impact of fake in-app spend is More importantly though, and a big risk to
the effect it has on skewing cohort analysis. the business, is that there’s a real chance
Users or players who are able to fake an that the marketing team could misidentify
in-app purchase are not self-controlled those users as valuable. This could mean
individuals capable of pinching lightly from that the company invests in a traffic source
the jar; they’re individuals who will take as that provides a number of in-app cheaters
much as they can whenever it is possible. or even creates a user persona that matches
the personality of cheaters – increasing the
This can cause problems for app businesses likelihood of costly mistakes down the line.
when it comes to identifying and attributing
valuable users. For example, an app maker There’s also another major impact that fake
might not have an extensive attribution in-app purchases can have on an app: the
system set-up. It acquires from one traffic damage it does to the app’s community.
source one hundred users, ten of whom Developers of free-to-play mobile games
repeatedly make fake in-app purchases. often spend time striking a careful balance
between providing benefits to big spenders
In this instance, the business is at risk of and supporting free players. So when players
doing two things. First, there’s the risk of a make fraudulent or fake in-app purchases
significant gap between the revenues the to get free coins, or in-game extras, it has
company tracks in-house and on a store. the potential to knock the in-game economy
This can cause confusion when it comes to off balance. This can cause legitimate users
analyzing the app’s performance and also to to feel less happy with their experience and
allocate budgets. increase the likelihood of them leaving.

19
Fighting back against Fake In-app Purchases
To combat fake in-app purchases, app There are a few main solutions to off-balance,
businesses need to be able to check purchase but they often depend on which operating
receipts against store receipts in real time, system we’re talking about. Let’s take a look
typically on a controlled server environment at the issue on each respective platform.
that users cannot fool, in order to verify when
and where spend takes place.

On iOS

Simple server-to-server receipt validation

In this solution, an app developer sends the The benefit of this approach is that it’s pretty
receipt from the app through their own server simple to integrate. But to make sure that this
just before the purchase is tracked within their process has any meaning, businesses have to
analytics. Apple’s servers then respond to the correctly attribute and track users to either
request with one of three status codes telling block them from the app or to remove them
you whether the purchase was real. from cohort analysis.

Full server-side receipt verification

This works in a similar way to simple server- located in Germany submitting a receipt from
to-server receipt validation, but it adds an Taiwan), full server-side receipt verification
extra layer of complexity to sanity check provides an extra layer of security. In order to
installs. check each and every field of in-app purchase
receipts, developers need to implement
By looking at the device ID and location locally specific decoding and decryption methods in
to see if there are any oddities (e.g. a device their app.

On Android

Simple server-to-server receipt validation

On Android, server-side receipt verification This means that it makes more sense to use
is tough because Android users access a the same simple approach outlined on iOS for
multitude of stores across the world. This Android. It might lack the complexity, but it
makes it much harder to add that extra layer will help most companies to begin tackling the
of complexity, as it has to be matched against issue in a meaningful way.
the practices of potentially dozens of different
Android stores (particularly in a country like
China).

20
Choosing the right Filtering Fake In-App
approach Purchase data
For many businesses, fake in-app purchases Whichever approach is taken, app businesses
will be significantly less of a problem than have to make sure that they’re attributing
for others. It can be easy to guess that free- users successfully to identify who is engaging
to-play games are affected the most, and in fake behavior. This is to allow the business
so will have to use multi-layered anti-fraud to do any of the following, either alone or in
techniques to try to beat the issue. For other conjunction with one another:
verticals, server-to-server receipts may be
enough.
• Ban the user from the app to prevent them
There will also be less need for purchase from making fake purchases in the future if
verification if the app processes payments they commit multiple offenses - such as a
using credit cards or Paypal. The higher two strike-rule - to both punish and allow
levels of security built into these systems can some leeway for first-time offenders.
prevent the majority of IAP fraud, though
these payment routes need to be carefully • Deduct fraudulent spend from revenue
monitored to ensure other types of fraud don’t modeling to ensure that business metrics
take place at the same time. are accurate, including the attribution of
user spend across marketing channels and
As for businesses worrying that fake in-app other figures like LTV.
spends might be a serious problem, the main
consideration for which approach to take will • Remove or separate fraudsters from
depend on the popularity of the app. marketing cohorts, to prevent data sets
from being corrupted and to identify the
Apps with a smaller audience will have fewer profile of users who will bend the rules.
players willing to bend the rules, as there is
less incentive to cheat to get ahead. This
means that simpler integrations will be able to By checking receipts and tying it into an
complete the job at hand, allowing the team to attribution strategy, app businesses can begin
focus on different priorities. to identify and remove fake in-app spenders
from their apps and their data sets.
But when an app or game becomes a hit, and
particularly when it reaches territory where
piracy is prevalent, opting for a detailed
verification process on the server side becomes
a much higher priority.

21
A call to arms
Mobile ad fraud is a significant problem developers might accidentally unfairly change
that affects the entire mobile advertising their game, with the effect of driving genuine
ecosystem. users out of their app.

Although it’s advertisers who bear the brunt In short, it’s in the interest of the entire
of fraud, poor quality attribution or technical advertising ecosystem to go after these issues.
difficulties, eradicating ad fraud is a challenge This means that publishers, advertisers,
the whole industry should come together to networks and attribution services should
solve. work together to help scrub the problem out
of the advertising economy.
When errors are introduced into any part
of the ecosystem, it cascades through the If we fail, fraud won’t go away. An effort to
industry in a number of different ways. An behave as one by implementing industry best
advertiser overspending on an incentivized practices could make a profound difference to
campaign loses the chance to spend in other the entire ecosystem.
channels; a network defrauded by install
fraud overpromises revenues to publishers This would help to slowly, but surely, erase
and accidentally tarnishes advertiser data; fraud from the app economy, creating an
fake in-app purchases knock the balance of industry that is more accountable, more open
popular games, creating situations where and more honest for everyone.

22
We've got our hands on a copy of

THE
FRAUDSTER'S
COOKBOOK
GET STARTED WITH MOBILE FRAUD TODAY

23
The Adjust Fraud Prevention Suite
Mobile ad fraud prevention, in real time.

Do you want to know more about how Adjust can help you stop mobile
ad fraud from affecting your campaigns?

Click here to find out more.

www.adjust.com

You might also like