Join impact.com's Referral Program! Get rewarded when your referrals become impact.com customers. Read more

What is device spoofing - lead gen fraud - Impact
Close Technique Button

Lead gen fraud

Device spoofing

Bad actors will produce worthless engagement (clicks, form fills with stolen information, etc.) on a single device. However, a large volume of activity from the same device and cookie is easily detectable as fraud. In order to fool advertisers, bad actors will spoof their browser and operating system (OS) and reset cookies, effectively allowing one device to impersonate many.

Technique Left Arrow 2
Technique Right Arrow

How they do it

  1. Malicious publisher has registered for advertiser’s lead gen campaign
  2. Malicious publisher’s site features a fake form fill, capturing the relevant personally identifiable information (PII) to satisfy advertiser’s lead gen criteria
  3. Malicious publisher uses emulator to send large volumes of automated traffic, first to publisher’s site and then to advertiser’s site
  4. Malicious Publisher auto populates the real user information stolen through its fake form fill into the advertiser’s actual form fill and submits the lead
  5. Malicious publisher simultaneously misrepresents emulator’s device ID to make the leads appear as if they are coming from multiple legitimate devices
  6. Advertiser attributes credit to malicious publisher for each lead generated, even though they provided automated traffic and submitted stolen information, and pays malicious publisher per lead submitted
Device spoofing
Next

Get in touch