What is inauthentic engagement - install fraud - Impact
Close Technique Button

Install fraud

Inauthentic engagement

By way of paid human engagement farms or scripted retention, fraud scheme operators will enact or automate post-install engagement if that is the advertiser’s payable event. For example, the bad actor may navigate past a certain level in a game to simulate authentic user engagement.

Technique Left Arrow 2
Technique Right Arrow

How they do it

  1. Malicious publisher has registered for advertiser’s CPI campaign, which only rewards a partner for driving an install after user has leveled up in the app
  2. Malicious publisher sends proxied, automated traffic to a botnet of mobile devices
  3. Malicious publisher installs advertiser’s app on all botnet member devices
  4. Malicious publisher instructs botnet member devices to not just install advertiser’s app, but also to open the app and engage with the game up to the point of the first level-up
  5. Advertiser attributes credit to malicious publisher for every install that reached level one, even though all installs came from bots programmed to play the app
Inauthentic engagement
Next

Get in touch