{"id":4570,"date":"2023-05-02T16:39:11","date_gmt":"2023-05-02T16:39:11","guid":{"rendered":"https:\/\/clickceasebiz.com\/blog\/?p=4570"},"modified":"2024-01-24T14:17:13","modified_gmt":"2024-01-24T14:17:13","slug":"a-short-history-of-ad-click-bots-ppc-fraud","status":"publish","type":"post","link":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/","title":{"rendered":"A Short History of Click Bots &#038; Ad Fraud"},"content":{"rendered":"\n<p>Click bots have been a thorn in the side of PPC marketers since the start. These pesky automated troublemakers zap the budget of businesses and have become increasingly sophisticated in recent years.<\/p>\n\n\n\n<p>This has led to alarming levels of click fraud losses for advertisers. It is estimated that global losses due to click fraud will reach 100 billion U.S. dollars in 2023, a significant increase from the 35 billion reported in 2018.  <\/p>\n\n\n\n<p>In this post, we\u2019ll list the most famous examples of click bots over time, their impact on ad campaigns today, and how you can avoid them.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#What_is_a_click_bot\" >What is a click bot?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#What_do_click_bots_do\" >What do click bots do?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#How_do_these_click_bots_work\" >How do these click bots work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#Click_fraud_pre-2006\" >Click fraud pre-2006<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#Click_fraud_post-2006\" >Click fraud post-2006<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#The_impact_of_these_types_of_bots_on_paid_campaigns\" >The impact of these types of bots on paid campaigns<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#How_to_detect_and_block_click_bots\" >How to detect and block click bots<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_a_click_bot\"><\/span>What is a click bot?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>A click bot is a type of software program designed to simulate user clicks on ads or other types of web content.<\/p>\n\n\n\n<p>In some cases, click bots can be beneficial. For example, some of them perform useful activities online, such as scanning websites for errors, tracking links in emails to detect spam, or automating tasks.<\/p>\n\n\n\n<p>However, the majority of click bots nowadays are used for fraudulent purposes. From fake traffic to manipulating ad campaigns, these bots seriously harm the online ecosystem.<\/p>\n\n\n\n<p>They can be used to perform simple tasks like clicking on buttons, posting comments (<a href=\"https:\/\/www.clickcease.com\/blog\/spambot-vs-marketing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>spambots<\/u><\/a>), or visiting websites (<a href=\"https:\/\/cheq.ai\/blog\/what-is-bot-traffic-how-to-stop\/\" target=\"_blank\" rel=\"noreferrer noopener\">bot traffic<\/a>). But, fraudsters are creating more sophisticated bots that can carry out more complex tasks and even mimic real user behavior. This can include \u2018browsing\u2019 a website, adding items to shopping baskets, or completing forms and downloads.<\/p>\n\n\n\n<p>In addition to individual click bots, there are also botnets. These are networks of interconnected bot programs that can perform tasks individually or as a unit. These bots are often run from a command and control (C&amp;C) center by a human operator. The bots themselves might be embedded on servers in a data center, or they can also be presented on infected user devices such as laptops and smartphones. <\/p>\n\n\n\n<script type=\"application\/ld+json\">{\n  \"@context\": \"http:\/\/schema.org\",\n  \"@type\": \"VideoObject\",\n  \"name\": \"What is Bot Traffic? | ClickCease Academy\",\n  \"description\": \"Learn what is bot traffic and how to block it https:\/\/bit.ly\/3imYBp3  Bot traffic: non-human traffic to a website or an app, coming through organic or paid traffic.  More than half of all internet traffic is automated, with bots and web crawlers an important part of the worldwide web ecosystem.   BUT - There are good bots and bad bots.  Good bots perform useful tasks such as:  - Delivering your search results - Collecting marketing and performance data - Automating repetitive tasks - Providing automated customer support - Helping you through a chat-bot returning those so-unnecessary shoes.  However, bots can also be used for malicious purposes and they tend to go undetected. For example:  - Spreading viruses and malware including ransomware - Credit card fraud - Account takeover and brute force attacks - Click fraud and ad fraud - where bots can be used to click on your ads automatically, often used together with fraudulent websites to boost the payout for ad clicks.  Data time!   Cybercrime accounts for over $1 trillion in lost revenue annually, with ad fraud and click fraud being the biggest contributor to this (https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/).  Fake traffic on PPC ads accounted for 41 billion dollars worth of losses in the marketing industry in 2021 alone (https:\/\/www.clickcease.com\/blog\/who-is-making-money-from-ad-fraud\/). Compare this with credit card fraud which was responsible for the theft of $31 billion in the same year (https:\/\/www.bbc.com\/worklife\/article\/20170711-credit-card-fraud-what-you-need-to-know).  Simply put - whether you\u2019re aware of that or not - bad bots are affecting all of us. As marketers, protecting our ads and websites from malicious bot traffic is becoming a standard necessity for keeping ourselves and our customers safe online.   Check out our ClickCease blog to get a deeper dive into bot traffic https:\/\/bit.ly\/3imYBp3  Want to know more about ClickCease and get a 7-day free trial? Click here https:\/\/www.clickcease.com\/\",\n  \"thumbnailUrl\": \"https:\/\/i.ytimg.com\/vi\/s5Rj1EIU23c\/default.jpg\",\n  \"uploadDate\": \"2022-12-01T14:18:59Z\",\n  \"duration\": \"PT1M33S\",\n  \"embedUrl\": \"https:\/\/www.youtube.com\/embed\/s5Rj1EIU23c\",\n  \"interactionCount\": \"215\"\n}<\/script><!--Video Markup Code Generated by https:\/\/videoschema.com\/ -->\n\n\n\n<figure class=\"wp-block-embed aligncenter is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"What is Bot Traffic? | ClickCease Academy\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/s5Rj1EIU23c?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"What_do_click_bots_do\"><\/span>What do click bots do?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The main goal of click bots is to deceive ad campaigns by generating fake clicks. They are conducted in a way that makes it look like the ad is being clicked by a real user. <\/p>\n\n\n\n<p>In the case of PPC fraud, the focus is fraudulent clicks on ads (display, video, or text\/search results). These ads are normally embedded on a website owned by a fraudster. The idea is that the fraudster then collects the payout for the clicks (or video impressions) on the ads that his site is hosting. <\/p>\n\n\n\n<p>Some other activities that click bots perform include generating bot traffic for social media, engaging with websites, and spamming or commenting.<\/p>\n\n\n\n<p>This bot traffic can also be used for more malicious fraud, such as distributing copies of themselves and spreading viruses. It can also perform cybercrime-related activities, such as <a href=\"https:\/\/www.clickcease.com\/blog\/what-is-a-ddos-attack\/\">denial of service (DDoS) attacks<\/a>.<\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"How_do_these_click_bots_work\"><\/span>How do these click bots work?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The bots themselves are technically a <a href=\"https:\/\/www.clickcease.com\/blog\/trojans-viruses-worms-bots-whats-the-difference\/\" target=\"_blank\" rel=\"noreferrer noopener\">type of virus<\/a> or Trojan, usually embedded on an internet-connected device such as a computer, tablet, server, or cellphone. <\/p>\n\n\n\n<p>The bots from these devices can then be either used as part of a network to click on these ads en masse. Or, they can carry out localized click fraud, for example, within an app (known as click injection or <a href=\"https:\/\/www.clickcease.com\/blog\/what-is-click-spam-and-how-does-it-affect-me\/\">click spamming<\/a>).<\/p>\n\n\n\n<p>Whatever the technique, every ad click costs an advertiser, somewhere in the world, some money\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-1024x683.jpg\" alt=\"There are many different type of clicker bots over the years\" class=\"wp-image-4576\" srcset=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-1024x683.jpg 1024w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-300x200.jpg 300w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-768x512.jpg 768w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-1536x1024.jpg 1536w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-scaled.jpg 2048w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-370x247.jpg 370w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-270x180.jpg 270w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/9275-740x493.jpg 740w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"Click_fraud_pre-2006\"><\/span>Click fraud pre-2006<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Most mentions of click fraud before 2006 are related to the practice of hosting ads on a low-quality site (or sites) and then clicking them en masse to collect the payout.<\/p>\n\n\n\n<p>This tended to be quite simple, with fraudulent publishers signing up their low-quality site for Google AdSense and then clicking the ads themselves (or hiring someone to do it for them).<\/p>\n\n\n\n<p>Even in 2003, there were <a href=\"https:\/\/www.zdnet.com\/article\/exposing-click-fraud\/\" target=\"_blank\" rel=\"noreferrer noopener\">mentions of bots<\/a> clicking on these ads, but much of the information is based on assumptions and partial research. Knowing there was a big problem with click fraud and ad fraud, Google employed a dedicated team to tackle the growing problem.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.clickcease.com\/blog\/competitor-click-fraud-a-case-study\/\" target=\"_blank\" rel=\"noreferrer noopener\">Competitor click fraud<\/a> has also been a problem since the early days of pay-per-click (PPC), with the practice becoming commonplace today.<\/p>\n\n\n\n<p>So, it was just a matter of time before click bots proliferated and became a bigger problem\u2026  <\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"Click_fraud_post-2006\"><\/span>Click fraud post-2006<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3>Clickbot A<\/h3>\n\n\n\n<ul>\n<li>Years active: 2006<\/li>\n\n\n\n<li>Estimated cost: $50,000<\/li>\n\n\n\n<li>Estimated infections: 100,000 computers<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"296\" height=\"200\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/old-robot-1.gif\" alt=\"early footage of Clickbot A commiting ad fraud\" class=\"wp-image-4578\"\/><\/figure><\/div>\n\n\n<p>In 2006, Google detected malicious software called <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.usenix.org\/legacy\/events\/hotbots07\/tech\/full_papers\/daswani\/daswani.pdf\"><u>Clickbot A<\/u><\/a> that conducted low-noise click fraud attacks on syndicated search networks.<\/p>\n\n\n\n<p>The bot targeted search results on Google-provided sponsored sites, with around 100,000 machines powering it.<\/p>\n\n\n\n<p>Clickbot A was the first real evidence of click fraud botnets, causing an estimated $50,000 worth of fraud. However, it pales in comparison to the more massive botnets that emerged later.<\/p>\n\n\n\n<h3>DNS Changer<\/h3>\n\n\n\n<ul>\n<li>Years active: 2007-2011<\/li>\n\n\n\n<li>Estimated cost: $14 million<\/li>\n\n\n\n<li>Estimated infections: 4 million computers (both Internet Explorer and Apple devices)<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><img decoding=\"async\" width=\"265\" height=\"300\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/metropolis-265x300.gif\" alt=\"At the time DNSChanger was the master of ad fraud botnets\" class=\"wp-image-4582\" srcset=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/metropolis-265x300.gif 265w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/metropolis-370x420.gif 370w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/metropolis-270x306.gif 270w\" sizes=\"(max-width: 265px) 100vw, 265px\" \/><\/figure><\/div>\n\n\n<p>The DNS Changer scam was created by a team of Estonians and Russians known as Rove Digital, which infected web browsers with ad fraud bots.<\/p>\n\n\n\n<p>The botnet changed infected devices&#8217; web addresses to domains owned by the gang and displayed ads that earned commissions.<\/p>\n\n\n\n<p>The DNS Changer ran for 4 years, with features that prevented anti-virus updates. Vladimir Tsastin, a member of the group, was convicted of wire fraud and money laundering. It is one of the first court cases against an <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/krebsonsecurity.com\/tag\/dnschanger\/\">ad fraud bot network<\/a>.<\/p>\n\n\n\n<h3>Miuref<\/h3>\n\n\n\n<ul>\n<li>Years active: 2013 &#8211; present<\/li>\n\n\n\n<li>Estimated cost: Unknown<\/li>\n\n\n\n<li>Estimated infections: Unknown<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"500\" height=\"267\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/terminator-back-1.gif\" alt=\"Like the Terminator, Miuref botnet keeps coming back\" class=\"wp-image-4586\"\/><\/figure><\/div>\n\n\n<p>Miuref, also known as Boaxxe, is a Trojan that can be delivered through fake documents and used for various online bot attacks. It was notably part of the 3ve botnet campaign and can also mine Bitcoin, steal data, and exploit security vulnerabilities.<\/p>\n\n\n\n<p>Despite being detectable and removable by antivirus software, Miuref remains a problem and continues to spread.&nbsp;<\/p>\n\n\n\n<p>It\u2019s unclear exactly how much financial damage Miuref has caused, as it is often used in conjunction with other botnets. And, as it isn\u2019t specifically a PPC campaign bot clicker, its financial impact will be in the multiple billions.<\/p>\n\n\n\n<h3>Stantinko<\/h3>\n\n\n\n<ul>\n<li>Years active: 2012 &#8211; present<\/li>\n\n\n\n<li>Estimated cost: Not known<\/li>\n\n\n\n<li>Estimated infections: 500,000+ machines<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"320\" height=\"240\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/bender-money-1.gif\" alt=\"Stantinko botnet keeps on finding new ways to make money\" class=\"wp-image-4588\"\/><\/figure><\/div>\n\n\n<p>Another multi-use botnet, <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/07\/Stantinko.pdf\"><u>Stantinko<\/u><\/a> has been identified as being behind a number of ad fraud campaigns but has recently shifted over to crypto mining.<\/p>\n\n\n\n<p>Initially, it was detected as a malware component in Chrome extensions, which facilitated ad injection. Additionally, the bot can install adware, access WordPress and Joomla sites, and perform Google searches.<\/p>\n\n\n\n<p>The gang behind this botnet has managed to keep it going for so many years as the code for the bot is hidden within reams of legitimate code. Stantinko affects mostly Russia and Ukraine but has also been found on systems outside these areas.<\/p>\n\n\n\n<h3>Bamital<\/h3>\n\n\n\n<ul>\n<li>Years active: 2009 &#8211; 2013<\/li>\n\n\n\n<li>Estimated cost: $700,000 per year<\/li>\n\n\n\n<li>Estimated infections: Up to one million desktop machines<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/ghostshell2-1.gif\" alt=\"Ghost in the Shell and Bamital botnet share some sililarities\" class=\"wp-image-4594\" width=\"400\"\/><\/figure><\/div>\n\n\n<p><a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/krebsonsecurity.com\/2013\/02\/microsoft-symantec-hijack-bamital-botnet\/\"><u>Bamital<\/u><\/a>, a type of malware that committed click fraud by redirecting search engine users to ads or pages with malware, was discovered by Microsoft in 2013.<\/p>\n\n\n\n<p>This bot evaded detection by hiding in web pages and being installed through &#8216;drive-by&#8217; downloads.<\/p>\n\n\n\n<p>The botnet was estimated to generate up to $1 million per year for its operators. Bamital&#8217;s search-hijacking technique affected Bing, Yahoo, and Google searchers.  <\/p>\n\n\n\n<h3>Chameleon<\/h3>\n\n\n\n<ul>\n<li>Years active: 2013<\/li>\n\n\n\n<li>Estimated cost: Around $6 million per day<\/li>\n\n\n\n<li>Estimated infections: 120,000 desktop machines<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/terminator2-gif-1.gif\" alt=\"The Terminator from Terminator 2 was a bit like the Chameleon botnet\" class=\"wp-image-4584\"\/><\/figure><\/div>\n\n\n<p>The Chameleon botnet, one of the initial click bots to mimic user behavior, targeted display ads, which was groundbreaking as text ads were the norm. <\/p>\n\n\n\n<p>Despite being relatively simple, it diverted over 50% of the ad revenue from 200 targeted sites through a uniform random series of fraudulent clicks and rollovers.<\/p>\n\n\n\n<h3>Kovter<\/h3>\n\n\n\n<ul>\n<li>Years active: 2014 &#8211; present<\/li>\n\n\n\n<li>Estimated cost: Not known<\/li>\n\n\n\n<li>Estimated infections: Unknown<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"476\" height=\"361\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/transformers-1.gif\" alt=\"Kovter botnet is a Decepticon\" class=\"wp-image-4590\"\/><\/figure><\/div>\n\n\n<p>Kovter is another click fraud botnet that has been leveraged by bigger campaigns. Like other long-lasting malware, it has managed to hide in long lines of code, including Windows registry files.<\/p>\n\n\n\n<p>It\u2019s a particularly clever bot that does its damage when the system is in \u2018sleep\u2019 or \u2018standby\u2019 mode. Kovter can also shut itself down whenever a system scan is started, making it hard for standard virus scanners to find it.<\/p>\n\n\n\n<h3>Methbot<\/h3>\n\n\n\n<ul>\n<li>Years active: 2015-2017<\/li>\n\n\n\n<li>Estimated cost: $3 million per day at the peak<\/li>\n\n\n\n<li>Estimated infections: 1,900 dedicated servers running 852,000 false IP addresses<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"480\" height=\"200\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/pacific-rim-1.gif\" alt=\"Methbot was one of the biggest ad fraud click bots ever\" class=\"wp-image-4596\"\/><\/figure><\/div>\n\n\n<p><a href=\"https:\/\/www.clickcease.com\/blog\/click-fraud-hall-of-fame-methbot-3ve\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Methbot<\/u><\/a>, the infamous botnet, used infected servers to fake website identities and generate fake video ad impressions. The group behind Methbot reportedly earned up to $5 million a day through these fake impressions. <\/p>\n\n\n\n<p>Methbot&#8217;s distinctive characteristic was its ability to pass off its fake inventory as legitimate premium inventory. Its massive scale alarmed the digital marketing industry, and it remains the standard for click fraud schemes, although its successor, 3ve, eventually surpassed it as the largest fraudulent network.<\/p>\n\n\n\n<h3>3ve (Eve)<\/h3>\n\n\n\n<ul>\n<li>Years active: 2017-2018<\/li>\n\n\n\n<li>Estimated cost: At least $29 million<\/li>\n\n\n\n<li>Estimated infections: 1.7 million hacked computers<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/robocop-ed209-1.gif\" alt=\"3ve was a monster botnet, much like ED209 from Robocop\" class=\"wp-image-4581\"\/><\/figure><\/div>\n\n\n<p>As Methbot was being shut down by the FBI, a new and bigger ad fraud network came to the fore. 3ve was actually run by most of the same team behind Methbot, but the complexity of this scheme was truly impressive.<\/p>\n\n\n\n<p>3ve was capable of even more video impressions and also managed to work despite ads.txt \u2013 actually using ads.txt lists to spoof inventory.&nbsp;&nbsp;<\/p>\n\n\n\n<p>It turned out that a team of Russian and Kazakh nationals was behind this huge scam, and the team made an estimated $29 million from its efforts.\u00a0<\/p>\n\n\n\n<h3>HummingBad<\/h3>\n\n\n\n<ul>\n<li>Years active: 2016<\/li>\n\n\n\n<li>Estimated cost: $300,000 per month in 2016<\/li>\n\n\n\n<li>Estimated infections: 10 million Android devices worldwide<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/03\/bird-bad.gif\" alt=\"HummingBad malware clicked ads from within Google Play apps\" class=\"wp-image-5008\"\/><\/figure><\/div>\n\n\n<p>HummingBad, a malware allegedly created by Chinese company YingMob to inflate ad clicks, highlighted the issue of mobile app infections. <\/p>\n\n\n\n<p>The software was not only an ad bot clicker but also had the ability to disguise click origins and potentially install software on devices without user knowledge.<\/p>\n\n\n\n<p>Although shut down in 2016, it resurfaced as <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.infosecurity-magazine.com\/news\/hummingwhale-google-play\/\"><u>HummingWhale in 2017<\/u><\/a> and infected over 20 Google Play store apps.<\/p>\n\n\n\n<h3>HyphBot<\/h3>\n\n\n\n<ul>\n<li>Years active: 2017<\/li>\n\n\n\n<li>Estimated cost: Up to $1.2 million per day<\/li>\n\n\n\n<li>Estimated infections: At least 500,000 computers in the US, UK, Netherlands and Canada<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"500\" height=\"354\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/chappie2-1.gif\" alt=\"Is HyphBot the most gangsta click bot ever?\" class=\"wp-image-4599\"\/><\/figure><\/div>\n\n\n<p>Another ad clicker that managed to get around ads.txt, HyphBot, was thought to be three or four times bigger than Methbot.<\/p>\n\n\n\n<p>It exploited ads.txt lists to generate composite domain names, creating fake video ad impressions. The creators utilized an existing botnet network to click ads.<\/p>\n\n\n\n<p>HyphBot ran for a short time but managed to embezzle millions of dollars in fraudulent ad revenue before eventually disappearing.<\/p>\n\n\n\n<h3>DrainerBot<\/h3>\n\n\n\n<ul>\n<li>Years active: 2018 &#8211; 2019<\/li>\n\n\n\n<li>Estimated cost: Not known<\/li>\n\n\n\n<li>Estimated infections: At least 10 million infections when discovered<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/mechagodzilla.gif\" alt=\"DrainerBot vs Mechagodzilla Bot Zapping\" class=\"wp-image-4600\" height=\"200\"\/><\/figure><\/div>\n\n\n<p>DrainerBot, as a malware botnet, was embedded in a software development kit (SDK) found in Android devices.<\/p>\n\n\n\n<p>The botnet evaded Google&#8217;s Play Protect checks and committed ad fraud by playing video ads in the background (using lots of data and battery power in the meantime). It&#8217;s no strange why the malware earned the name DrainerBot. It could use up to 10GB of data and was draining battery life quickly.<\/p>\n\n\n\n<p>All apps identified as containing <a href=\"https:\/\/www.clickcease.com\/blog\/ad-fraud-hall-of-fame-drainerbot\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>DrainerBot<\/u><\/a> have been removed from the Play Store, but this ad clicker bot may still be out there\u2026  <\/p>\n\n\n\n<h3>404Bot<\/h3>\n\n\n\n<ul>\n<li>Years active: 2018 &#8211; present<\/li>\n\n\n\n<li>Estimated cost: At least $15 million<\/li>\n\n\n\n<li>Estimated infections: Not known<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"480\" height=\"247\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/GUNDAM.gif\" alt=\"Is the 404 Bot inspired by Japanese Manga series Gundam?\" class=\"wp-image-4614\"\/><\/figure><\/div>\n\n\n<p>Another botnet targeting the weak links in ads.txt, this bot clicker spoofs domain inventory in a similar way to HyphBot. In fact, it seems that <a href=\"https:\/\/www.clickcease.com\/blog\/what-is-ads-txt-does-it-work-and-should-you-use-it\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>404 Bot<\/u><\/a> is capable of passing several different preventative techniques and continues to deplete marketing funds as we speak.  <\/p>\n\n\n\n<p>With an estimated $15 million in damage as of February 2020, how many more millions will be siphoned off by 404 Bot?<\/p>\n\n\n\n<h3>Tekya<\/h3>\n\n\n\n<ul>\n<li>Years active: 2019-2020<\/li>\n\n\n\n<li>Estimated cost: Not known<\/li>\n\n\n\n<li>Estimated infections: At least 56 apps, over 1 million downloads<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" width=\"498\" height=\"198\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/ultron-1.gif\" alt=\"Tekya and Ultron are both evil botnets\" class=\"wp-image-4602\"\/><\/figure><\/div>\n\n\n<p>Tekya, a clicker bot, was found in 56 Android apps, including children&#8217;s games and utility apps. It engaged with ads without user knowledge, using a clicker malware called Haken.<\/p>\n\n\n\n<p>Since May 2019, Tekya has committed click fraud on over 1 million downloads, clicking on visible and invisible ads to mimic user behavior.<\/p>\n\n\n\n<h3>And this isn&#8217;t all&#8230;.<\/h3>\n\n\n\n<p>This list of click bots and ad fraud networks isn\u2019t even definitive. We haven\u2019t even mentioned <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/05\/26\/google-shuts-down-massive-ad-fraud-on-play-store\/?sh=3db735217807\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Judy<\/u><\/a>, a malware-based ad clicker from South Korea that was allegedly distributed by an app developer to inflate their ad revenue. <\/p>\n\n\n\n<p>Some other known botnets that we haven&#8217;t mentioned are IceBucket or SourMint, both recent botnets that have caused havoc. There are dozens of smaller botnets that don\u2019t have a name or run long enough for the authorities to find them.<\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"The_impact_of_these_types_of_bots_on_paid_campaigns\"><\/span>The impact of these types of bots on paid campaigns<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Click bots can be a total headache for everyone running online ads. From advertisers that run PPC campaigns for clients to small business owners running their own ads to marketing teams managing multiple marketing activities.<\/p>\n\n\n\n<p>We&#8217;ve already mentioned that fake clicks mainly affect PPC ads and their budgets. Unfortunately, this also leads to many more negative effects. Below are the top ones you should aim to avoid:<\/p>\n\n\n\n<ul>\n<li>Waste of marketing budgets: The main pitfall of click bots. Every time a click bot generates a fake click, it&#8217;s wasting your ad budget.<\/li>\n\n\n\n<li>Misleading analytics: Fake click data is also incorporated into your analytics. This gives you incorrect insights, leading to poor decision-making.<\/li>\n\n\n\n<li>Challenging optimization process: Campaign optimization based on irrelevant data will not produce a positive outcome, again wasting your time and efforts.<\/li>\n\n\n\n<li>Decreased engagement: When the click bots artificially increase click-through rates, it can lead to decreased engagement from real users.<\/li>\n\n\n\n<li>Ineffective ad targeting: Adjusting audience targeting due to bot traffic can harm your other marketing optimization efforts as well.<\/li>\n<\/ul>\n\n\n\n<p>As we can see, click bots are not just affecting your ad campaigns like Google Ads or Facebook Ads, but they are a threat to your overall marketing efforts as well.<\/p>\n\n\n\n<p>That&#8217;s why it is important to prevent them from happening in the first place.<\/p>\n\n\n\n<h2><span class=\"ez-toc-section\" id=\"How_to_detect_and_block_click_bots\"><\/span>How to detect and block click bots<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Detecting bot clicks can be challenging, but it&#8217;s not impossible. Here are some actionable steps that you can take to detect and avoid click bots:<\/p>\n\n\n\n<ol>\n<li>Monitor Your Website Traffic: Keep track of your website&#8217;s traffic to detect suspicious patterns, such as sudden increases in clicks or clicks coming at unusual times of the day.<\/li>\n\n\n\n<li>Narrow down your targeting: With more specific audience targeting, it&#8217;s easier to detect when clicks are coming from unusual audience groups.<\/li>\n\n\n\n<li>Limit your ad runtime: By not running your ads 24\/7, you can limit the possibilities of some click bots that are scheduled at specific times to access them.<\/li>\n\n\n\n<li>Implement CAPTCHAs: CAPTCHAs are a popular way to prevent bots from accessing your website. The most basic forms usually include image or text recognition tests to verify that the user is human.<\/li>\n<\/ol>\n\n\n\n<p>While these steps can help reduce bot traffic&#8217;s impact, it&#8217;s essential to note that they cannot guarantee 100% effectiveness. We&#8217;re also aware that implementing them can be difficult and time-consuming.<\/p>\n\n\n\n<p>Fortunately, ClickCease streamlines this whole process. ClickCease is a bot detection tool designed to mitigate and block bot clicks in real time.    <\/p>\n\n\n\n<p>If you want to keep your PPC ads (or any other marketing activity) free of click bots, check out the free trial <a href=\"https:\/\/dashboard.clickcease.com\/dashboard\/index.html?_gl=1*1s6bnp4*_ga*MTE3NzEzODc1NC4xNjgyNjY4NTYw*_ga_0M4HYXKERR*MTY4MzAyMTc0Ni4xMS4xLjE2ODMwMjE3NzYuMzAuMC4w#\/signup.html?utm_source=blog\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>. You can look at exactly how many fake clicks your ads get before you sign up.<\/p>\n\n\n\n<p>Make sure your PPC ad spend is only being seen by genuine human eyes, not clicker bots or click farm workers.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/www.clickcease.com\/blog\/what-is-click-fraud\/\"><strong><em><u>Find out more about click fraud in our in-depth guide<\/u><\/em><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Click bots have been a thorn in the side of PPC marketers since the start. These pesky automated troublemakers zap the budget of businesses and have become increasingly sophisticated in recent years. This has led to alarming levels of click fraud losses for advertisers. It is estimated that global losses due to click fraud will [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":5964,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[2,5],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Short History of Click Bots &amp; Ad Fraud | ClickCease Blog<\/title>\n<meta name=\"description\" content=\"Online bots are coded programs designed to perform an action or various actions, some malicious. Discover the history of click bots &amp; ad fraud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Short History of Click Bots &amp; Ad Fraud | ClickCease Blog\" \/>\n<meta property=\"og:description\" content=\"Online bots are coded programs designed to perform an action or various actions, some malicious. Discover the history of click bots &amp; ad fraud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickCease Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ClickCease-484865984976254\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-02T16:39:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-24T14:17:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/clickbots.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oli Lynch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/OliLynchWrites\" \/>\n<meta name=\"twitter:site\" content=\"@clickcease\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oli Lynch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"16 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\"},\"author\":{\"name\":\"Oli Lynch\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b\"},\"headline\":\"A Short History of Click Bots &#038; Ad Fraud\",\"datePublished\":\"2023-05-02T16:39:11+00:00\",\"dateModified\":\"2024-01-24T14:17:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\"},\"wordCount\":2542,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\"},\"articleSection\":[\"Ad Fraud\",\"Click Fraud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\",\"url\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\",\"name\":\"A Short History of Click Bots & Ad Fraud | ClickCease Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#website\"},\"datePublished\":\"2023-05-02T16:39:11+00:00\",\"dateModified\":\"2024-01-24T14:17:13+00:00\",\"description\":\"Online bots are coded programs designed to perform an action or various actions, some malicious. Discover the history of click bots & ad fraud.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.clickcease.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Short History of Click Bots &#038; Ad Fraud\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#website\",\"url\":\"https:\/\/www.clickcease.com\/blog\/\",\"name\":\"ClickCease Blog\",\"description\":\"How to protect your ppc campaigns from click fraud.\",\"publisher\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.clickcease.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\",\"name\":\"ClickCease\",\"url\":\"https:\/\/www.clickcease.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png\",\"contentUrl\":\"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png\",\"width\":300,\"height\":70,\"caption\":\"ClickCease\"},\"image\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ClickCease-484865984976254\/\",\"https:\/\/twitter.com\/clickcease\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b\",\"name\":\"Oli Lynch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g\",\"caption\":\"Oli Lynch\"},\"description\":\"Since working for ClickCease, Oli has become something of a click fraud nerd, and now bores people at parties with facts about click farms and internet traffic stats. When not writing about ad fraud, he helps companies to optimise their marketing content and strategy with his own content marketing business.\",\"sameAs\":[\"http:\/\/www.olilynch.com\/\",\"https:\/\/www.linkedin.com\/in\/olilynch77\/\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/OliLynchWrites\"],\"url\":\"https:\/\/www.clickcease.com\/blog\/author\/oli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Short History of Click Bots & Ad Fraud | ClickCease Blog","description":"Online bots are coded programs designed to perform an action or various actions, some malicious. Discover the history of click bots & ad fraud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/","og_locale":"en_US","og_type":"article","og_title":"A Short History of Click Bots & Ad Fraud | ClickCease Blog","og_description":"Online bots are coded programs designed to perform an action or various actions, some malicious. Discover the history of click bots & ad fraud.","og_url":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/","og_site_name":"ClickCease Blog","article_publisher":"https:\/\/www.facebook.com\/ClickCease-484865984976254\/","article_published_time":"2023-05-02T16:39:11+00:00","article_modified_time":"2024-01-24T14:17:13+00:00","og_image":[{"width":1200,"height":684,"url":"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2020\/08\/clickbots.png","type":"image\/png"}],"author":"Oli Lynch","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/OliLynchWrites","twitter_site":"@clickcease","twitter_misc":{"Written by":"Oli Lynch","Est. reading time":"16 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#article","isPartOf":{"@id":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/"},"author":{"name":"Oli Lynch","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b"},"headline":"A Short History of Click Bots &#038; Ad Fraud","datePublished":"2023-05-02T16:39:11+00:00","dateModified":"2024-01-24T14:17:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/"},"wordCount":2542,"commentCount":0,"publisher":{"@id":"https:\/\/www.clickcease.com\/blog\/#organization"},"articleSection":["Ad Fraud","Click Fraud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/","url":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/","name":"A Short History of Click Bots & Ad Fraud | ClickCease Blog","isPartOf":{"@id":"https:\/\/www.clickcease.com\/blog\/#website"},"datePublished":"2023-05-02T16:39:11+00:00","dateModified":"2024-01-24T14:17:13+00:00","description":"Online bots are coded programs designed to perform an action or various actions, some malicious. Discover the history of click bots & ad fraud.","breadcrumb":{"@id":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.clickcease.com\/blog\/a-short-history-of-ad-click-bots-ppc-fraud\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.clickcease.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Short History of Click Bots &#038; Ad Fraud"}]},{"@type":"WebSite","@id":"https:\/\/www.clickcease.com\/blog\/#website","url":"https:\/\/www.clickcease.com\/blog\/","name":"ClickCease Blog","description":"How to protect your ppc campaigns from click fraud.","publisher":{"@id":"https:\/\/www.clickcease.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.clickcease.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.clickcease.com\/blog\/#organization","name":"ClickCease","url":"https:\/\/www.clickcease.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png","contentUrl":"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png","width":300,"height":70,"caption":"ClickCease"},"image":{"@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ClickCease-484865984976254\/","https:\/\/twitter.com\/clickcease"]},{"@type":"Person","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b","name":"Oli Lynch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g","caption":"Oli Lynch"},"description":"Since working for ClickCease, Oli has become something of a click fraud nerd, and now bores people at parties with facts about click farms and internet traffic stats. When not writing about ad fraud, he helps companies to optimise their marketing content and strategy with his own content marketing business.","sameAs":["http:\/\/www.olilynch.com\/","https:\/\/www.linkedin.com\/in\/olilynch77\/","https:\/\/twitter.com\/https:\/\/twitter.com\/OliLynchWrites"],"url":"https:\/\/www.clickcease.com\/blog\/author\/oli\/"}]}},"_links":{"self":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/4570"}],"collection":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/comments?post=4570"}],"version-history":[{"count":52,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/4570\/revisions"}],"predecessor-version":[{"id":10487,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/4570\/revisions\/10487"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/media\/5964"}],"wp:attachment":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/media?parent=4570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/categories?post=4570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/tags?post=4570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}