Graybeard
Well-Known Member
I wonder how this fraud affected your ad buys and your ad sales?
How did this affect your CR and EPC?
Source and indictment filed 11/27/2018:
Feds take down international hacker ring that cost advertisers millions - Marketing Land
Two International Cybercriminal Rings Dismantled and Eight Defendants Indicted for Causing Tens of Millions of Dollars in Losses in Digital Advertising Fraud
https://www.justice.gov/usao-edny/press-release/file/1114576/download
^^^indictment
RMT:SK/AFM/MTK
F. #2016R02228
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF NEW YORK
UNITED STATES OF AMERICA
- against -
ALEKSANDR ZHUKOV,
BORIS TIMOKHIN,
MIKHAIL ANDREEV,
DENIS AVDEEV,
DMITRY NOVIKOV,
SERGEY OVSYANNIKOV,
ALEKSANDR ISAEV and
YEVGENIY TIMCHENKO,
Defendants
________________________________
THE GRAND JURY CHARGES:
...
Brands commonly paid for advertising on a lump-sum basis,and publishers commonly received payment based on how many times users clicked on or viewed advertisements (sometimes referred to as "impressions").
The entities in between the brands and the publishers—the DSPs, SSPs and ad networks that connected SSPs with publishers—charged fees along the way.
3.
The defendants in this case used sophisticated computer programming and infrastructure spread around the world to exploit the digital advertising industry through fraud.
They represented to others that they ran legitimate ad networks that delivered advertisements to real human internet users accessing real internet webpages.
In fact, the defendants faked both the users and the webpages: in each of the charged schemes, they programmed computers they controlled to load advertisements on fabricated webpages, via an automated program, in order to fraudulently obtain digital advertising revenue.
4.
In one iteration—a datacenter-based scheme referred to in the ad industry as "Methbot"—the defendants used computers they controlled that they had rented from commercial datacenters in Dallas, Texas, and elsewhere.
5.
In another iteration—a botnet-based scheme referred to in the ad industry as "3ve.2 Template A"—the defendants used computers to which they had gained unauthorized access (i.e. that had been "hacked"), including computers belonging to ...
Case 1:18-cr-00633-ERK Document 8 Filed 11/27/18 Page 2 of 34 PageID #: 49
How did this affect your CR and EPC?
- Did you get ripped off with fake traffic?
- Did you get accused of sending fake traffic as a publisher?
- Do you understand what has happened here and do you give a shit?
Source and indictment filed 11/27/2018:
Feds take down international hacker ring that cost advertisers millions - Marketing Land
Two International Cybercriminal Rings Dismantled and Eight Defendants Indicted for Causing Tens of Millions of Dollars in Losses in Digital Advertising Fraud
https://www.justice.gov/usao-edny/press-release/file/1114576/download
^^^indictment
RMT:SK/AFM/MTK
F. #2016R02228
UNITED STATES DISTRICT COURT
EASTERN DISTRICT OF NEW YORK
UNITED STATES OF AMERICA
- against -
ALEKSANDR ZHUKOV,
BORIS TIMOKHIN,
MIKHAIL ANDREEV,
DENIS AVDEEV,
DMITRY NOVIKOV,
SERGEY OVSYANNIKOV,
ALEKSANDR ISAEV and
YEVGENIY TIMCHENKO,
Defendants
________________________________
THE GRAND JURY CHARGES:
...
Brands commonly paid for advertising on a lump-sum basis,and publishers commonly received payment based on how many times users clicked on or viewed advertisements (sometimes referred to as "impressions").
The entities in between the brands and the publishers—the DSPs, SSPs and ad networks that connected SSPs with publishers—charged fees along the way.
3.
The defendants in this case used sophisticated computer programming and infrastructure spread around the world to exploit the digital advertising industry through fraud.
They represented to others that they ran legitimate ad networks that delivered advertisements to real human internet users accessing real internet webpages.
In fact, the defendants faked both the users and the webpages: in each of the charged schemes, they programmed computers they controlled to load advertisements on fabricated webpages, via an automated program, in order to fraudulently obtain digital advertising revenue.
4.
In one iteration—a datacenter-based scheme referred to in the ad industry as "Methbot"—the defendants used computers they controlled that they had rented from commercial datacenters in Dallas, Texas, and elsewhere.
5.
In another iteration—a botnet-based scheme referred to in the ad industry as "3ve.2 Template A"—the defendants used computers to which they had gained unauthorized access (i.e. that had been "hacked"), including computers belonging to ...
Case 1:18-cr-00633-ERK Document 8 Filed 11/27/18 Page 2 of 34 PageID #: 49