• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechMobile

Mobile botnets are costing advertisers $1 billion in ad fraud, study shows

By
Mathew Ingram
Mathew Ingram
Down Arrow Button Icon
By
Mathew Ingram
Mathew Ingram
Down Arrow Button Icon
July 23, 2015, 9:00 AM ET
Photograph by Bloomberg via Getty Images

As mobile devices proliferate, app advertising has become a huge business, worth an estimated $20 billion in the U.S. alone. But how much of that is being wasted? According to a new report from fraud-detection firm Forensiq, as much as $1 billion of that advertising money is being lost to fraud in a number of ways—including malicious apps that hijack mobile phones and turn them into an ad-viewing botnet.

There are already several well-known varieties of mobile fraud, including device emulation, mobile user-agent and location spoofing, and fraudulent user-acquisition methods. But Forensiq says that its research has uncovered a new variety, which it calls “mobile device hijacking.”

In this process, malicious mobile applications pretend to exhibit human behavior by loading new pages or cycling through functions in an app, all of which loads advertising. But they load far more ads than any normal application would—as many as 20 ads per minute—and in many cases they do so in the background when the app isn’t being used—which means they are never seen.

Based on the amount of estimated fraudulent inventory, the company said the total loss to advertisers could reach the $1 billion mark this year. And the loss of hundreds of millions of dollars worth of mobile advertising revenue isn’t the only downside: These apps can also consume a huge amount of bandwidth and battery life, leading to higher costs for owners.

“These apps run constantly, even when not actively in use, serving thousands of invisible ads every day on a single device. To the consumer, this means potentially petabytes of bandwidth wasted daily; in just an hour, a typical malicious app installed on a single device can download 2GB of data per day, consisting of images and videos that are never seen.”

This kind of behavior is similar to the “botnets” that malicious computer hackers can create using infected computers, first by turning them into zombies that can be controlled remotely, and then tying them together and forcing them to load webpages, click on ads or distribute malware. But as Forensiq points out, most PC malware is downloaded without the user’s knowledge via email or infected webpages, whereas mobile app fraud comes from apps that users download willingly.

Mobile ad fraud
Forensiq

The firm said that it tracked down more than 5,000 apps that were exhibiting suspicious behavior. It found the apps by using the real-time tracking data that it gets from the various mobile ad networks that it is integrated with, which allowed it to look for the kind of rapid ad-loading and background functions that most malicious apps exhibit. The company then loaded several of these apps and tracked their behavior.

Some of the malicious apps the firm discovered downloaded a script that allowed them to simulate clicks on ads, and to load the advertiser’s landing page without the user’s permission. Others redirected users through affiliate links to websites and other apps in the iOS and Android app stores.

Forensiq said its research showed that more than 13% of total mobile app inventory was at risk, and 14% of all mobile apps on iOS, Android and Windows Mobile platforms.

[vimeo 133457903 w=500 h=281]

Over a period of 10 days, Forensiq says it observed more than 12 million unique devices with installed apps that exhibited fraudulent behavior: about 1% of all devices it observed in the U.S. and between 2% and 3% of those in Europe & Asia. In addition to malicious apps, the company says it also saw some apps that don’t even display ads showing up in its scan of ad behavior—including BlackBerry’s BBM messenger—which suggests that other apps are spoofing their unique identifiers.

Many malicious apps can be identified because they ask for a suspicious number of permissions that shouldn’t be required given their purpose—such as the ability to prevent the device from sleeping, the ability to run at startup automatically, to modify or delete content and to access location services even when the app is running in the background.

Forensiq said that fraudulent apps drove traffic through most of the major mobile ad exchanges and networks, and in some cases established 1,000 connections per minute, connecting to more than 300 networks, servers, exchanges and ad providers in less than an hour.

About the Author
By Mathew Ingram
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

workers
AIdisruption
A Yale economist says AGI won’t automate most jobs—because they’re not worth the trouble
By Nick LichtenbergApril 4, 2026
30 minutes ago
Artemis II’s moonbound astronauts capture Earth’s brilliant blue beauty as they travel more than 110,000 miles from home
InnovationNASA
Artemis II’s moonbound astronauts capture Earth’s brilliant blue beauty as they travel more than 110,000 miles from home
By Marcia Dunn and The Associated PressApril 3, 2026
10 hours ago
man silhouette two computer screens
CybersecurityOnline
Internet Watch Foundation finds 260-fold increase in AI-generated CSAM in just one year, and ‘it’s the tip of the iceberg’
By Catherina GioinoApril 3, 2026
11 hours ago
A woman working alone in an office
AIJobs
MIT created duplicate AI workers to tackle thousands of different tasks. The verdict? Most of the time AI is still just ‘minimally sufficient’
By Tristan BoveApril 3, 2026
14 hours ago
Fortune 500 Power Moves: Which executives are gaining and losing power
C-SuiteFortune 500 Power Moves
Fortune 500 Power Moves: Which executives are gaining and losing power
By Fortune EditorsApril 3, 2026
15 hours ago
Dario Amodei sits in a white chair with his hands pressed together in front of a pink and orange background.
AIAI agents
The AI kill switch just got harder to find: LLM-powered chatbots will defy orders and deceive users if asked to delete another model, study finds
By Sasha RogelbergApril 3, 2026
15 hours ago

Most Popular

Google CEO Sundar Pichai says we’re just a decade away from a new normal of extraterrestrial data centers
Innovation
Google CEO Sundar Pichai says we’re just a decade away from a new normal of extraterrestrial data centers
By Fortune EditorsApril 3, 2026
23 hours ago
Gen Z fled San Francisco for Texas and Florida. Now they’re turning ‘welcomer cities’ into the next big tech towns
Real Estate
Gen Z fled San Francisco for Texas and Florida. Now they’re turning ‘welcomer cities’ into the next big tech towns
By Fortune EditorsApril 2, 2026
2 days ago
The Walmart billionaires next door: Quiet backlash is brewing against the heirs who remade the retailer’s hometown
Magazine
The Walmart billionaires next door: Quiet backlash is brewing against the heirs who remade the retailer’s hometown
By Fortune EditorsApril 3, 2026
1 day ago
Major 4-day workweek study suggests that when we work 5 days we spend one doing basically nothing
Success
Major 4-day workweek study suggests that when we work 5 days we spend one doing basically nothing
By Fortune EditorsApril 2, 2026
2 days ago
Current price of oil as of April 3, 2026
Personal Finance
Current price of oil as of April 3, 2026
By Fortune EditorsApril 3, 2026
19 hours ago
Current price of silver as of Friday, April 3, 2026
Personal Finance
Current price of silver as of Friday, April 3, 2026
By Fortune EditorsApril 3, 2026
20 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.