联盟平台切换很麻烦?不存在的!impact.com专业解决方案,助力品牌联盟项目实现质的飞跃! 立即查看

What is inauthentic engagement - install fraud - Impact
Close Technique Button

Install fraud

Inauthentic engagement

By way of paid human engagement farms or scripted retention, fraud scheme operators will enact or automate post-install engagement if that is the advertiser’s payable event. For example, the bad actor may navigate past a certain level in a game to simulate authentic user engagement.

Technique Left Arrow 2
Technique Right Arrow

How they do it

  1. Malicious publisher has registered for advertiser’s CPI campaign, which only rewards a partner for driving an install after user has leveled up in the app
  2. Malicious publisher sends proxied, automated traffic to a botnet of mobile devices
  3. Malicious publisher installs advertiser’s app on all botnet member devices
  4. Malicious publisher instructs botnet member devices to not just install advertiser’s app, but also to open the app and engage with the game up to the point of the first level-up
  5. Advertiser attributes credit to malicious publisher for every install that reached level one, even though all installs came from bots programmed to play the app
Inauthentic engagement
Next

Get in touch