Ad Fraud Tutorial Series: What is Click Injection?
Digital ad fraud is a growing challenge for mobile application marketers. And fraudsters are constantly developing new methodologies to deliver fraudulent installs and other desirable consumer actions. This series of posts is designed to help app marketers understand the key methodologies for perpetrating mobile ad fraud, and how they can detect and defend their businesses against bad actors that would steal digital advertising investment from their brand. This post is about the challenges that arise from fraudster use of click injection.
What is Click Injection?
The traffic flow for an install is a bit more complicated than for other forms of desirable digital advertising actions. With an install, there are extra steps that need to be considered — steps which provide an opportunity for app ad fraud. Here’s a brief synopsis of the process in five discrete steps.
- A user sees an ad and clicks on it, and is redirected to an app store (either Apple App Store or Google Play.) The ad network records the click and sends information about the time the click occurred to the attribution platform.
- The user downloads the app and installs it on their device
- The user must then launch the app in order for the install to register with the attribution provider.
- When the attribution provider receives the signal of an install, it then examines all of the ad signals it has received from ad networks to determine which network(s) deserve credit for that install. In most cases, credit for the install is awarded to the advertiser that delivered the last click before an install.
- If no clicks have been registered, then the install is counted as an organic install, and no credit is awarded to an advertiser.
Note: with self-attribution media sources, there’s an additional step, but it is not relevant to understanding click injection.
While sometimes apps are launched immediately after an install, in other cases there is a delay of minutes, hours or days. This delay provides fraudulent actors with the opportunity to claim credit for an install even though they actually did not drive it.
Innocuous-Looking Fraud Apps
The trick they use to do this is to encourage users to download and install a seemingly innocuous free app. For example, a flashlight or toolbar app. The app can function as advertised, but its real purpose is to perpetrate click injection fraud. Often such mobile apps originate in third-party Android app stores.
Download the Singular Fraud Index
SIngular has just released its 2017 Singular Fraud Index, which reveals the mobile industry’s Most Secure Ad Networks. The Index is the first study of its kind to examine fraud data collected from multiple fraud prevention solutions, each with its own set of proprietary detection methods. Drawing on this unique dataset, the study exposes the effectiveness of today’s most common anti-fraud mechanisms as well as the 25 ad networks driving the lowest rates of fraud.
Get your free copy here.
It does this by listening for an “install broadcast” — a signal that an app has been launched for the first time on a device. The signal can include a campaign id, and the attribution provider uses this to determine which media source drove the last click.
When the install broadcast is sent, the app goes into action, informing the attribution provider that they just registered an ad click for the campaign, even though no click has taken place. By timing the fraudulent click to the moment of install, the fraudster ensures that it is the “last click” — it will get credit for the install when the app is actually launched for the first time.
An Android Phenomenon
Click injection is a type of ad fraud unique to Android, because only Android sends install broadcast messages to the apps on a user’s device at the moment of first launch. That broadcast is necessary to alert the fraudulent app to send a click signal to the attribution provider.
How Click Injection Hurts Your Data
The clicks that these fraudulent app claim to have occurred never actually occurred. Instead, they falsely claim credit for installs driven by other ad networks. Thus they can significantly distort attributions and through them budget allocations.
Detecting Click Injection
The primary way that companies detect possibly injected clicks by examining the timing of the reported click versus the first launch. With click injection, the timings are likely very close to one another. With other installs, the timings tend to take place farther apart, and follow a fairly consistent distribution. This pattern recognition is an important part of how companies detect and prevent ad fraud.
Defending Your Business Against All Forms of Ad Fraud
Click injection is one of the many ways that app businesses can be affected by ad fraud. Here are a few strategies to help you detect ad fraud in a variety of forms, and protect your business from the costs of ad fraud.
- Anti-Fraud Tools: Some attribution and analytics suites offer tools to help marketers identify and prevent ad fraud. SIngular, for example, automatically offers many protections. Such tools often use signals like IP addresses, click and install pattern detection, and activity monitoring to pinpoint campaigns, partners and buying models that are driving suspicious app installs.
- Common Sense: A deal that sounds too good to be true is likely to result in low-quality app installs.Marketers must constantly resist the temptation to sign up for media deals that sound too good to be true.
- Focusing Resources on Trusted Partners: Most brands spend a great deal of money on installs. It makes sense, then, to focus dollars on partners that you know and trust.
- Leveraging Retention and Uninstall Data: By comparing the set of user traffic attracted by different media companies, brands can learn a lot about user quality. Low user retention or high uninstall rates increasingly are seen as signals of possible fraudulent activity.
- Use ROI Analytics as a Primary KPI:.When app publishers measure and optimize to ROI, you get both a true picture of the value of the user traffic that you are driving, and a powerful way to optimize your digital advertising investments.
Even a cursory review of this list reveals that seriously addressing ad fraud on your own requires a significant investment of time and money. That’s one of the reasons why companies look to their attribution and analytics providers to carry much of the water. Fortunately, Singular clients are protected from many of the costs and hassles of ad fraud with an unsurpassed set of fraud detection and prevention capabilities.
Singular and Ad Fraud
Singular offers an industry-leading fraud solutions that you can learn more about right here. For a capsule summary of some of the steps we take to detect and prevent ad fraud for our clients, read on.
With Singular, app publishers have visibility into ad performance, media investment, and revenue data. That provides unique advantages in detecting and protecting clients from fraud.
Singular’s New Anti-Fraud Improvements
Our fraud detection and fraud prevention technologies are a mix of the best known techniques today as well unique proprietary techniques only we can offer. We constantly examine data flow into our unified analytics platform, looking for signs of fraudulent activity such as illegitimate networks, IP addresses, devices, mismatches in targeting, and more.
In addition, Singular verifies all Android and iPhone app IAPs with the appropriate app store to ensure that cash has changed hands before recording a purchase. Also, with full uninstall and user retention insights right in the platform, Singular helps you identify sources and campaigns with suspiciously high consumer app uninstall rates.
These are just a few of the ways that Singular helps protect our clients from fraud. Contact us for more information on the Singular solution and how it can help protect your business.