• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechMobile

Mobile botnets are costing advertisers $1 billion in ad fraud, study shows

By
Mathew Ingram
Mathew Ingram
Down Arrow Button Icon
By
Mathew Ingram
Mathew Ingram
Down Arrow Button Icon
July 23, 2015, 9:00 AM ET
Photograph by Bloomberg via Getty Images

As mobile devices proliferate, app advertising has become a huge business, worth an estimated $20 billion in the U.S. alone. But how much of that is being wasted? According to a new report from fraud-detection firm Forensiq, as much as $1 billion of that advertising money is being lost to fraud in a number of ways—including malicious apps that hijack mobile phones and turn them into an ad-viewing botnet.

There are already several well-known varieties of mobile fraud, including device emulation, mobile user-agent and location spoofing, and fraudulent user-acquisition methods. But Forensiq says that its research has uncovered a new variety, which it calls “mobile device hijacking.”

In this process, malicious mobile applications pretend to exhibit human behavior by loading new pages or cycling through functions in an app, all of which loads advertising. But they load far more ads than any normal application would—as many as 20 ads per minute—and in many cases they do so in the background when the app isn’t being used—which means they are never seen.

Based on the amount of estimated fraudulent inventory, the company said the total loss to advertisers could reach the $1 billion mark this year. And the loss of hundreds of millions of dollars worth of mobile advertising revenue isn’t the only downside: These apps can also consume a huge amount of bandwidth and battery life, leading to higher costs for owners.

“These apps run constantly, even when not actively in use, serving thousands of invisible ads every day on a single device. To the consumer, this means potentially petabytes of bandwidth wasted daily; in just an hour, a typical malicious app installed on a single device can download 2GB of data per day, consisting of images and videos that are never seen.”

This kind of behavior is similar to the “botnets” that malicious computer hackers can create using infected computers, first by turning them into zombies that can be controlled remotely, and then tying them together and forcing them to load webpages, click on ads or distribute malware. But as Forensiq points out, most PC malware is downloaded without the user’s knowledge via email or infected webpages, whereas mobile app fraud comes from apps that users download willingly.

Mobile ad fraud
Forensiq

The firm said that it tracked down more than 5,000 apps that were exhibiting suspicious behavior. It found the apps by using the real-time tracking data that it gets from the various mobile ad networks that it is integrated with, which allowed it to look for the kind of rapid ad-loading and background functions that most malicious apps exhibit. The company then loaded several of these apps and tracked their behavior.

Some of the malicious apps the firm discovered downloaded a script that allowed them to simulate clicks on ads, and to load the advertiser’s landing page without the user’s permission. Others redirected users through affiliate links to websites and other apps in the iOS and Android app stores.

Forensiq said its research showed that more than 13% of total mobile app inventory was at risk, and 14% of all mobile apps on iOS, Android and Windows Mobile platforms.

[vimeo 133457903 w=500 h=281]

Over a period of 10 days, Forensiq says it observed more than 12 million unique devices with installed apps that exhibited fraudulent behavior: about 1% of all devices it observed in the U.S. and between 2% and 3% of those in Europe & Asia. In addition to malicious apps, the company says it also saw some apps that don’t even display ads showing up in its scan of ad behavior—including BlackBerry’s BBM messenger—which suggests that other apps are spoofing their unique identifiers.

Many malicious apps can be identified because they ask for a suspicious number of permissions that shouldn’t be required given their purpose—such as the ability to prevent the device from sleeping, the ability to run at startup automatically, to modify or delete content and to access location services even when the app is running in the background.

Forensiq said that fraudulent apps drove traffic through most of the major mobile ad exchanges and networks, and in some cases established 1,000 connections per minute, connecting to more than 300 networks, servers, exchanges and ad providers in less than an hour.

About the Author
By Mathew Ingram
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

hacking
CybersecurityHacking
Student hackers get revenge on final exams as ‘ShinyHunters’ takes down nearly 9,000 schools study software
By Heather Hollingsworth and The Associated PressMay 8, 2026
2 hours ago
Michael Saylor says remarks about selling Bitcoin were intended to jam short-sellers and ‘haters’ 
CryptoBitcoin
Michael Saylor says remarks about selling Bitcoin were intended to jam short-sellers and ‘haters’ 
By Ben WeissMay 8, 2026
2 hours ago
Apple promised a smarter Siri, but a lawsuit says it didn’t deliver—and you can get up to $95 back
LawApple
Apple promised a smarter Siri, but a lawsuit says it didn’t deliver—and you can get up to $95 back
By Catherina GioinoMay 8, 2026
2 hours ago
Fortune 500 Power Moves: Which executives gained and lost power this week
C-SuiteFortune 500 Power Moves
Fortune 500 Power Moves: Which executives gained and lost power this week
By Fortune EditorsMay 8, 2026
3 hours ago
Tired hispanic man in a professional suit feeling sad while waiting for the appointment of a job interview at a recruitment office
EconomyJobs
The job market is healing for everyone—except in the office
By Eva RoytburgMay 8, 2026
3 hours ago
Anthropic grew 80-fold in a single quarter. Now it’s renting Elon Musk’s data center to cope
AIAnthropic
Anthropic grew 80-fold in a single quarter. Now it’s renting Elon Musk’s data center to cope
By Marco Quiroz-GutierrezMay 8, 2026
3 hours ago

Most Popular

California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
North America
California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
By Sasha RogelbergMay 7, 2026
22 hours ago
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
Arts & Entertainment
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
By Dave Lozo and Morning BrewMay 7, 2026
23 hours ago
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
Economy
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
By Eleanor PringleMay 7, 2026
1 day ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
2 days ago
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
Success
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
By Emma BurleighMay 7, 2026
1 day ago
Current price of oil as of May 7, 2026
Personal Finance
Current price of oil as of May 7, 2026
By Joseph HostetlerMay 7, 2026
1 day ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.