{"id":5605,"date":"2021-08-24T11:55:00","date_gmt":"2021-08-24T11:55:00","guid":{"rendered":"https:\/\/clickceasebiz.com\/blog\/?p=5605"},"modified":"2023-12-13T10:00:15","modified_gmt":"2023-12-13T10:00:15","slug":"what-is-website-spoofing-how-does-it-work","status":"publish","type":"post","link":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/","title":{"rendered":"What is Website Spoofing &#038; How Does it Work?"},"content":{"rendered":"\n<p>Website spoofing. Sounds funny doesn\u2019t it?<\/p>\n\n\n\n<p>Although we all love a good spoof when it comes to the movies, website spoofing, unfortunately, isn\u2019t very funny.<\/p>\n\n\n\n<p>The practice of spoofing websites, sometimes referred to as domain spoofing, can be used for a variety of malicious purposes. And for a developer or coder with fairly basic knowledge, it\u2019s pretty easy to do.&nbsp;<\/p>\n\n\n\n<h2>What does website spoofing mean?<\/h2>\n\n\n\n<p>A spoofed website is a site that has been fraudulently copied and is also referred to as domain spoofing. This can be done by creating a website that looks similar to the original and using a fake domain name.&nbsp;<\/p>\n\n\n\n<p>Domain spoofing can also be done using a genuine URL with a falsified slug. So, the domain URL will be correct, for example, Forbes.com. But the slug will go to a non-existing page, for example, \/buy-best-coffee-beans. \u00a0<\/p>\n\n\n\n<p>This is a method used by 404Bot, an active ad fraud network, to generate fake <a href=\"https:\/\/www.clickcease.com\/blog\/ad-impressions-what-are-you-really-paying-for\/\">ad impressions<\/a> using genuine URLs. <\/p>\n\n\n\n<p>With the domain spoofed, fraudsters can then force a redirect from the original URL or find ways to drive traffic using bots.<\/p>\n\n\n\n<p>These types of websites can often look exactly the same as the genuine article, with the same content, logo, font, and contact information. However, the name or some other element might be different, for example, f0rbes.com, forbes.xyz, or forbes-online.net.<\/p>\n\n\n\n<h2>Website spoofing examples<\/h2>\n\n\n\n<p>As an example, I looked up f0rbes.com and it landed on this hot mess of a spoofed website. The URL, as you\u2019ll notice, is totally different from the one I entered and the site itself is trying to copy the UK\u2019s Mirror.co.uk news site.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-1024x576.jpeg\" alt=\"An example of website spoofing used for phishing fraud\" class=\"wp-image-5606\" srcset=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-1024x576.jpeg 1024w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-300x169.jpeg 300w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-768x432.jpeg 768w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-370x208.jpeg 370w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-270x152.jpeg 270w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image-740x416.jpeg 740w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/image.jpeg 1366w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The content is trying to sell some sort of shady crypto investment, so is basically a phishing scam.&nbsp;<\/p>\n\n\n\n<p>Refreshing the site actually brings up another bogus news article, this time from a spoofed BBC page. Again, it\u2019s about Bitcoin and is asking for personal details and payment information.<\/p>\n\n\n\n<p>Entering the actual domain from the browser results in a 404 page. So clearly this is a scam website.<\/p>\n\n\n\n<h2>What is a website or domain spoofing used for?<\/h2>\n\n\n\n<p>Of course, spoofed websites are used for a wide range of fraudulent purposes. These include:<\/p>\n\n\n\n<ul>\n<li>Phishing or stealing personal information<\/li>\n\n\n\n<li>Stealing data or bypassing security<\/li>\n\n\n\n<li>Hijacking traffic for fraud or cyber attacks<\/li>\n\n\n\n<li>Making a fraudulent website appear genuine<\/li>\n\n\n\n<li>Spreading malware or spyware&nbsp;<\/li>\n\n\n\n<li>Committing ad fraud by forcing fake ad views<\/li>\n<\/ul>\n\n\n\n<p>Spoofing attacks are usually used for data breaches, or even as a precursor to DDoS or ransomware attacks.&nbsp;<\/p>\n\n\n\n<p>One of the most common ways to use spoofed websites is for phishing, usually by linking from within an SMS text message or email. The user then assumes that the website is a genuine article and inputs their login details or other sensitive information.<\/p>\n\n\n\n<p>However, as you can see above, website spoofing has a wide variety of applications.<\/p>\n\n\n\n<p>Ad fraud, a popular and lucrative cybercrime, often uses spoofed websites. This form of click fraud sees fraudulent publishers generate spoofed domains to host banner or video ads, and then use bot traffic to inflate the views and the ad payout.&nbsp;<\/p>\n\n\n\n<p>A lot of ad fraud also comes from malware, such as the <a data-type=\"post\" data-id=\"4311\" href=\"https:\/\/www.clickcease.com\/blog\/ad-fraud-hall-of-fame-drainerbot\/\">DrainerBot campaign<\/a>. This sneaky bot worked in the background of apps on users&#8217; devices as a malware install. It would generate views and impressions of video and banner ads on spoofed websites without the users&#8217; knowledge.<\/p>\n\n\n\n<h2>Email spoofing<\/h2>\n\n\n\n<p>One aspect of domain spoofing is creating fake email addresses or email spoofing.&nbsp;<\/p>\n\n\n\n<p>These are usually part of the phishing or scamming process, designed to get you to click and engage with the spoofed site. This practice is known as <a href=\"https:\/\/www.malwarebytes.com\/social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>, where a scammer gains the trust of someone with the intent to defraud them.<\/p>\n\n\n\n<p>Email spoofing can also happen after a data breach. For example, if your website has been hacked or experienced a DDoS attack, you might find your company emails being used to spam people.&nbsp;<\/p>\n\n\n\n<p>This might be part of the hackers&#8217; attempt to steal your user data, but can also be a sign of an ongoing security breach.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-1024x739.jpg\" alt=\"what is website or domain spoofing?\" class=\"wp-image-5607\" width=\"768\" height=\"554\" srcset=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-1024x739.jpg 1024w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-300x216.jpg 300w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-768x554.jpg 768w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-370x267.jpg 370w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-270x195.jpg 270w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing-740x534.jpg 740w, https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/spoofing.jpg 1300w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/figure><\/div>\n\n\n<h2>How can you spot spoofed or fake websites<\/h2>\n\n\n\n<p>As most forms of fraud related to spoofed websites come from your inbox or direct messaging, you should always pay attention to the link.&nbsp;<\/p>\n\n\n\n<p>Even if a link appears to be from a reputable source, such as your bank, or other service provider, take a close look. Keep an eye out for odd spelling, unusual characters (such as Chinese font within English text), or anything that might look slightly out of place.<\/p>\n\n\n\n<p>If in doubt, <em>don\u2019t click<\/em>. Instead, enter the domain directly into your browser to check. If the message is flagging up an issue with your account, always contact customer service or log in without clicking the link in the message.&nbsp;<\/p>\n\n\n\n<p>If you do find you have clicked what might be a spoofed domain link, avoid downloading or opening anything, or entering your details. And if you think your details have been compromised, let your service provider (bank, software service, etc) know.<\/p>\n\n\n\n<h3>Dodgy downloads<\/h3>\n\n\n\n<p>Malware or infected browser extensions can also be a source of spoofed domain traffic. These software infections can use your genuine human activity to perform clicks or activity on&nbsp;ads, download links, or domain URLs. This last one is a clever way that fraudsters use &#8216;genuine human visitors&#8217; to inflate site traffic. <\/p>\n\n\n\n<h3>Ad fraud and website spoofing<\/h3>\n\n\n\n<p>Spotting if your PPC ads have been displayed on a spoofed site can be tricky.&nbsp;<\/p>\n\n\n\n<p>Google does let you check your <a href=\"https:\/\/support.google.com\/google-ads\/answer\/2470108?hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">ad placements<\/a>. And you can also customize where your ads appear if you\u2019d prefer that they are only displayed on specific websites.<\/p>\n\n\n\n<p>In general spotting an ad placement on a spoofed site can be like spotting a needle in a haystack. But as these kinds of fraud networks tend to use bots, there are other things to keep an eye out for.<\/p>\n\n\n\n<p>Some of the giveaways are high volumes of traffic from a certain site, often accompanied by high bounce rates. You might also spot multiple clicks in a short amount of time, repeat clicks from the same IP address, or an increase in spam or abandoned shopping carts.<\/p>\n\n\n\n<p>Using a click fraud protection service is the best way to prevent this kind of spoofing attack or bot traffic.&nbsp;<\/p>\n\n\n\n<h2>Blocking bots and fraud<\/h2>\n\n\n\n<p>Most of us are aware of the many security threats online. From phishing scams to bot traffic, businesses need fraud prevention more than ever.<\/p>\n\n\n\n<p>For starters, business owners and managers should keep their workforce aware of the potential for security breaches, and how to avoid them. Awareness of email security, data protection, and communication practices can all help to reduce the chances of problems arising from a spoofing attack.<\/p>\n\n\n\n<p>Blocking fraud bots on your website can also prevent issues from click fraud to <a href=\"https:\/\/www.clickcease.com\/blog\/are-carding-bots-using-your-ecommerce-site-to-commit-fraud\/\" target=\"_blank\" rel=\"noreferrer noopener\">carding<\/a>.<\/p>\n\n\n\n<p>Marketing professionals can protect their online ads using ClickCease. Sign up for a free trial to run an audit on your ads and see how much bot or VPN traffic you\u2019re seeing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Website spoofing. Sounds funny doesn\u2019t it? Although we all love a good spoof when it comes to the movies, website spoofing, unfortunately, isn\u2019t very funny. The practice of spoofing websites, sometimes referred to as domain spoofing, can be used for a variety of malicious purposes. And for a developer or coder with fairly basic knowledge, [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":5825,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[2],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Website Spoofing &amp; How Does It Work? | ClickCease Blog<\/title>\n<meta name=\"description\" content=\"The practice of spoofing websites, also referred to as domain spoofing, can be used for various malicious purposes. Learn what is website spoofing and how it works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Website Spoofing &amp; How Does It Work? | ClickCease Blog\" \/>\n<meta property=\"og:description\" content=\"The practice of spoofing websites, also referred to as domain spoofing, can be used for various malicious purposes. Learn what is website spoofing and how it works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"ClickCease Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ClickCease-484865984976254\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-24T11:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-13T10:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/website_spoofing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"684\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Oli Lynch\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/OliLynchWrites\" \/>\n<meta name=\"twitter:site\" content=\"@clickcease\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oli Lynch\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\"},\"author\":{\"name\":\"Oli Lynch\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b\"},\"headline\":\"What is Website Spoofing &#038; How Does it Work?\",\"datePublished\":\"2021-08-24T11:55:00+00:00\",\"dateModified\":\"2023-12-13T10:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\"},\"wordCount\":1203,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\"},\"articleSection\":[\"Ad Fraud\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\",\"url\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\",\"name\":\"What is Website Spoofing & How Does It Work? | ClickCease Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#website\"},\"datePublished\":\"2021-08-24T11:55:00+00:00\",\"dateModified\":\"2023-12-13T10:00:15+00:00\",\"description\":\"The practice of spoofing websites, also referred to as domain spoofing, can be used for various malicious purposes. Learn what is website spoofing and how it works.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.clickcease.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Website Spoofing &#038; How Does it Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#website\",\"url\":\"https:\/\/www.clickcease.com\/blog\/\",\"name\":\"ClickCease Blog\",\"description\":\"How to protect your ppc campaigns from click fraud.\",\"publisher\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.clickcease.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#organization\",\"name\":\"ClickCease\",\"url\":\"https:\/\/www.clickcease.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png\",\"contentUrl\":\"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png\",\"width\":300,\"height\":70,\"caption\":\"ClickCease\"},\"image\":{\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ClickCease-484865984976254\/\",\"https:\/\/twitter.com\/clickcease\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b\",\"name\":\"Oli Lynch\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g\",\"caption\":\"Oli Lynch\"},\"description\":\"Since working for ClickCease, Oli has become something of a click fraud nerd, and now bores people at parties with facts about click farms and internet traffic stats. When not writing about ad fraud, he helps companies to optimise their marketing content and strategy with his own content marketing business.\",\"sameAs\":[\"http:\/\/www.olilynch.com\/\",\"https:\/\/www.linkedin.com\/in\/olilynch77\/\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/OliLynchWrites\"],\"url\":\"https:\/\/www.clickcease.com\/blog\/author\/oli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Website Spoofing & How Does It Work? | ClickCease Blog","description":"The practice of spoofing websites, also referred to as domain spoofing, can be used for various malicious purposes. Learn what is website spoofing and how it works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/","og_locale":"en_US","og_type":"article","og_title":"What is Website Spoofing & How Does It Work? | ClickCease Blog","og_description":"The practice of spoofing websites, also referred to as domain spoofing, can be used for various malicious purposes. Learn what is website spoofing and how it works.","og_url":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/","og_site_name":"ClickCease Blog","article_publisher":"https:\/\/www.facebook.com\/ClickCease-484865984976254\/","article_published_time":"2021-08-24T11:55:00+00:00","article_modified_time":"2023-12-13T10:00:15+00:00","og_image":[{"width":1200,"height":684,"url":"https:\/\/www.clickcease.com\/blog\/wp-content\/uploads\/2021\/08\/website_spoofing.png","type":"image\/png"}],"author":"Oli Lynch","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/OliLynchWrites","twitter_site":"@clickcease","twitter_misc":{"Written by":"Oli Lynch","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#article","isPartOf":{"@id":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/"},"author":{"name":"Oli Lynch","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b"},"headline":"What is Website Spoofing &#038; How Does it Work?","datePublished":"2021-08-24T11:55:00+00:00","dateModified":"2023-12-13T10:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/"},"wordCount":1203,"commentCount":0,"publisher":{"@id":"https:\/\/www.clickcease.com\/blog\/#organization"},"articleSection":["Ad Fraud"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/","url":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/","name":"What is Website Spoofing & How Does It Work? | ClickCease Blog","isPartOf":{"@id":"https:\/\/www.clickcease.com\/blog\/#website"},"datePublished":"2021-08-24T11:55:00+00:00","dateModified":"2023-12-13T10:00:15+00:00","description":"The practice of spoofing websites, also referred to as domain spoofing, can be used for various malicious purposes. Learn what is website spoofing and how it works.","breadcrumb":{"@id":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.clickcease.com\/blog\/what-is-website-spoofing-how-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.clickcease.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Website Spoofing &#038; How Does it Work?"}]},{"@type":"WebSite","@id":"https:\/\/www.clickcease.com\/blog\/#website","url":"https:\/\/www.clickcease.com\/blog\/","name":"ClickCease Blog","description":"How to protect your ppc campaigns from click fraud.","publisher":{"@id":"https:\/\/www.clickcease.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.clickcease.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.clickcease.com\/blog\/#organization","name":"ClickCease","url":"https:\/\/www.clickcease.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png","contentUrl":"https:\/\/clickceaseblog.kinsta.cloud\/wp-content\/uploads\/2019\/02\/cc-logo-black.png","width":300,"height":70,"caption":"ClickCease"},"image":{"@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ClickCease-484865984976254\/","https:\/\/twitter.com\/clickcease"]},{"@type":"Person","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/b78aa0c9f82503dd2e1f6ea669e73d2b","name":"Oli Lynch","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.clickcease.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6703777663617e10544867a6e661a11c?s=96&d=mm&r=g","caption":"Oli Lynch"},"description":"Since working for ClickCease, Oli has become something of a click fraud nerd, and now bores people at parties with facts about click farms and internet traffic stats. When not writing about ad fraud, he helps companies to optimise their marketing content and strategy with his own content marketing business.","sameAs":["http:\/\/www.olilynch.com\/","https:\/\/www.linkedin.com\/in\/olilynch77\/","https:\/\/twitter.com\/https:\/\/twitter.com\/OliLynchWrites"],"url":"https:\/\/www.clickcease.com\/blog\/author\/oli\/"}]}},"_links":{"self":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/5605"}],"collection":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/comments?post=5605"}],"version-history":[{"count":12,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/5605\/revisions"}],"predecessor-version":[{"id":10360,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/posts\/5605\/revisions\/10360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/media\/5825"}],"wp:attachment":[{"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/media?parent=5605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/categories?post=5605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clickcease.com\/blog\/wp-json\/wp\/v2\/tags?post=5605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}