Loading...

31 Jan 2026 07:51

Mobile & Digital

Unmasking The Next Generation of Mobile Fraud

On April 1st, the tech industry celebrates April Fools Day. Today, April 2nd, we declare that we are #FoolsNoMore.

As marketers, we are sick and tired of mobile fraud and we aren’t going to fall for the same old pranks anymore. To kick this off, we are opening our doors, sharing never-before-seen insights into how fraud works, where it hits, where it’s heading and how we tackle these emerging issues with Protect360.

Back in November, Forrester reported that mobile marketers’ biggest challenges are data visibility, a lack of knowledge, a lack of transparency and mobile ad fraud. Today, we are going to close that fraud gap. Today, we are #FoolsNoMore.

Fraud Is Evolving and Growing

Fraud is evolving faster than ever before. In 2014 fraudsters tried spoofing our SDK, so we added encryption and shut it down. It took fraudsters almost six months to find a new attack vector. In contrast, fraudsters now adapt to new anti-fraud solutions in weeks, and sometimes even days.

To compound matters, fraud isn’t just getting faster, it’s hitting harder. In September, we predicted that by the end of 2017, 1 in 10 attributed installs would be driven by fraud, exposing the industry about 2.2 – 2.6 billion dollars in annual loss. By the end of Q1 2018, we passed an 11.5% global fraud rate, a 15% jump from the 2017 average fraud rate. However, this figure can be misleading. Rising CPI rates and overall industry growth has increased the financial impact of fraud by 30% exposing 700 and 800 million dollars in mobile advertising to fraud over just three months!

Fraud Comes In Waves: The Rise of Bots

Fraud comes in waves. When a marketer is found to be vulnerable, fraudsters will generally double down, hitting even harder. When new protection hits the market, fraudsters are forced to adapt.

When we introduced Protect360 in September 2017, DeviceID Reset Fraud rates were very high. These rates quickly dropped as fraudsters tested new DeviceID Reset Fraud patterns, and new fraud types. Though we saw fraud attack vectors evolve, the old techniques never really went away. In early Q4 2017, there was a resurgence in nearly every type of fraud. With this sudden resurgence, a number of bots tried to spoof our SDK in limited pockets around the world. While many of these bots were blocked, we geared up for a new wave of bot innovation.

Scaling and Automating Protection For The Next Generation of Fraud

Over the last six months, we have partnered with leading mobile businesses, diving deep into new anomalies and emerging fraud types, as well as finding and testing new fraud signatures using our proprietary, cross-publisher database. Since launch, our Protect360 database has grown to over 5.7 billion devices and over 1 trillion monthly events. Thanks to this scale, we are able to detect and block new fraud types, including bots and behavioral anomalies with unmatched speed and effectiveness.

This investment in data-centric innovation has born remarkable fruits. We partnered with Google to introduce the new Google Referrer API and started blocking referrer hijacking, a new class of install hijacking. In addition to upgrading our protection against install hijacking and introducing customizable install hijacking protection with Validation Rules, we automated our click flooding protection. With the recent resurgence of bots, we added additional security measures to our SDK as well as automated blocking based on our proprietary bot signature database. Thanks to the unique scale of our database we further developed a new technology that automatically detects behavioral anomalies, and will soon roll out automated protection against sources trafficking this non-human activity. In response to changing DeviceID Reset Fraud patterns, we updated our DeviceRank algorithms a number of times, blocking more fraudulent activity with each update.

Bottom Line

The game has changed for anti-fraud providers. Rather than building and deploying new fraud solutions on a typical agile model, releasing a new fraud protection every few months, we must now operate like anti-virus provider – continuously scanning data, finding abnormalities and updating our protection.

 

Written by Jon Burg,Head of Product Marketing at AppsFlyer

NULL
(Visited 21 times, 1 visits today)
peri hokiperihokiduta76duta 76ABC1131 - MPO SLOTABC1131 Bandar Slot Togelmix parlay agen slot qrisslot thailandmain pagi hari buat admin kewalahan pola jitu mahjong wild 2 sicbo terbaca duta76 gates of olympuspecahan mahjong ways 2 pgsoft nonstop ini trik kaitkan master baccarat duta76 starlight princess duta76duta76 teknik menyusun target kemenangan berbasis algoritma rtp live jitu mahjong wins 3 blackjack sweet bonanzakerangka taktik jitu bermain aman acuan data mahjong ways pgsoft roulette wil west gold perihoki gacorpemetaan peluang menang berbasis rtp live tinggi permainan perihoki mahjong wins 3 pragmatic blackjack aztec gemsstrategi paling jitu mengelola spin otomatis untuk mahjong wild deluxe scatter sicbo gates of olympus perihokitips jitu analisis data kemenangan perencanaan strategi aman di mahjong ways 2 pgsoft baccarat perihoki lucky nekobocoran analisis mendalam soal pola auto menang di mahjong wins 3 pragmatic blackjack perihoki sugar rushcara sempurna menghidupkan pola populer sabung ayam sv388 mahjong ways 2 pgsoft roulette duta76pembahasan mendalam soal faktor kemenangan di mahjong wins 3 pragmatic blackjack sbobet terbarudokumentasi lengkap analisis pola waktu bermain pgsoftcara meningkatkan hasil strategi indikator balikan tinggievaluasi multi sesi wild bounty titik balik keuntungantaktik adaptif mengelola taruhan fluktuasi mahjong ways 2peran penting indikator sistem strategi sepuluh juta rupiahlaporan manajemen strategi waktu terbaik mekanik pgsoftsensasi meja nyata live baccarat era digital terbarukekuatan logika kesabaran mengatur timing pengambilan keputusanseni mengamati proses keputusan tenang meja baccaratpanduan jam bermain populer akurasi strategi gameaws alasan mahjong ways 2aws desain antarmuka mahjong waysaws evolusi desain pg soft mahjongaws fenomena scatter hitam mahjongaws mekanisme kombinasi simbol mahjongaws metode observasi sabar mahjongaws panduan simbol spesial mahjong wins 2aws perbandingan keberuntungan manajemen modalaws strategi pemetaan pola mahjongaws update teknologi mahjong ways 3aws dampak grid progresif mahjong ways 2aws investigasi black scatter mahjong waysaws observasi wild data winrateaws respon tempo pemain profesional mahjongaws strategi siklus golden spin mahjongaws strategi terstruktur fluktuasi mahjong ways 2aws struktur kombinasi khusus mahjong ways 2aws teknik membaca tempo mahjong ways 2aws tinjauan formasi simbol mahjong wins 3aws tren taruhan kecil mahjong wins 3ketika jalur mahjong wins scatter hitammahjong ways mengalir scatter wildmahjong wins jalur scatter hitam segalanyaawalnya terkendali mahjong wins scatterjalur aman mahjong wins scatter hitamkeseimbangan mahjong ways scatter hitammahjong ways terlena halus scatter wildmahjong wins tenang scatter mengintaitransisi visual gulungan bawa ritme baru pada mahjong ways 2 rahasia kemenangan yang mengejutkan Top