- Joined
- Sep 22, 2023
- Messages
- 90
- Points
- 18
Mobile content, also known as mobile subscriptions, is a profitable niche with well-adjusted flows. Since the early 2000s, Mobile Value Added Services (mVAS) offers have been blossoming all around. mVAS services appeared on the market as soon as cell phones became mainstream. Today, it’s hard to imagine not having an opportunity to purchase digital content, subscribe to a music streaming service, watch a movie, or choose a game to play with the help of DCB technology.
Direct Carrier Billing (DCB) offers you to subscribe to a service with money on your mobile phone account instead of using a credit card or any other traditional payment method. Some people prefer to keep their personal card details private, and this is where DCB enters the scene. The likes of Apple, Spotify, and Amazon opted for this payment method in specific regions.
Since mVAS deals with DCB transactions, there is always a risk that someone will try to take advantage of the financial flow. Fraudsters aim at each part of the mVAS ecosystem, from end-users to content providers and MNOs (mobile network operators or carriers.)
In general, there are two types of fraud: advertising fraud, when attackers earn payouts with fake clicks generated by dedicated software, and DCB fraud, connected to the payment method itself and targeted at end-users and carriers. We’ll get into details on fraud types in the article section of the same name.
This text explains the importance of fighting fraud in the mVAS vertical and how to combat deceitful schemes. As a nice bonus, it includes interviews with anti-fraud companies that deal with scammers in mobile content so that you can receive honest firsthand opinions.
Fraud harms the whole mobile content ecosystem, from advertisers to publishers. If an advertiser receives fraudulent traffic, their offers don’t pay off, and they lose money. Consequently, affiliate programs might suffer, so there will be rate cuts and payout problems, directly influencing affiliate marketers and webmasters.
As a result, an advertiser might think about preventing the situations when they receive fraudulent traffic. For instance, they will include an anti-fraud system in the workflow. Anti-fraud systems cost money, so the rate for affiliates will drop.
This means that unscrupulous affiliate marketers who run fraudulent traffic will suffer from their own actions and decisions.
Apart from them, conscientious affiliates will suffer too. To attract decent media buyers, affiliate networks spend real money on marketing. When an advertiser and affiliate network suffer, they decrease the rate, making good affiliates suffer in turn. This leads to worsening traffic, so the rate drops again, and a great offer is just wasted.
As we’ve mentioned in the introduction of our article, mobile content fraud is divided into two general categories: advertising fraud and DCB fraud. Let’s talk about each type in detail.
Subcategories of advertising fraud include:
Examples include misinformation when a user receives misleading information and purchases something they otherwise wouldn’t buy if they knew the correct information. There might be a misleading call-to-action that says «Play now» and triggers a payment once clicked (1 click flow.)
Some deliberately fake ads such as «You have won X sum of money» lead to additional steps and undesired purchases, which is a misleading incentive.
Another subtype of social engineering fraud is trust manipulation, when scammers use a logo of a famous brand or an identity of a prominent person to trick a user into an unwanted purchase.
Direct Carrier Billing (DCB) offers you to subscribe to a service with money on your mobile phone account instead of using a credit card or any other traditional payment method. Some people prefer to keep their personal card details private, and this is where DCB enters the scene. The likes of Apple, Spotify, and Amazon opted for this payment method in specific regions.
Since mVAS deals with DCB transactions, there is always a risk that someone will try to take advantage of the financial flow. Fraudsters aim at each part of the mVAS ecosystem, from end-users to content providers and MNOs (mobile network operators or carriers.)
In general, there are two types of fraud: advertising fraud, when attackers earn payouts with fake clicks generated by dedicated software, and DCB fraud, connected to the payment method itself and targeted at end-users and carriers. We’ll get into details on fraud types in the article section of the same name.
This text explains the importance of fighting fraud in the mVAS vertical and how to combat deceitful schemes. As a nice bonus, it includes interviews with anti-fraud companies that deal with scammers in mobile content so that you can receive honest firsthand opinions.
Why is fraud hurtful for both advertisers and publishers?
Fraud harms the whole mobile content ecosystem, from advertisers to publishers. If an advertiser receives fraudulent traffic, their offers don’t pay off, and they lose money. Consequently, affiliate programs might suffer, so there will be rate cuts and payout problems, directly influencing affiliate marketers and webmasters.
As a result, an advertiser might think about preventing the situations when they receive fraudulent traffic. For instance, they will include an anti-fraud system in the workflow. Anti-fraud systems cost money, so the rate for affiliates will drop.
This means that unscrupulous affiliate marketers who run fraudulent traffic will suffer from their own actions and decisions.
Apart from them, conscientious affiliates will suffer too. To attract decent media buyers, affiliate networks spend real money on marketing. When an advertiser and affiliate network suffer, they decrease the rate, making good affiliates suffer in turn. This leads to worsening traffic, so the rate drops again, and a great offer is just wasted.
Fraud types in the Mobile content niche
As we’ve mentioned in the introduction of our article, mobile content fraud is divided into two general categories: advertising fraud and DCB fraud. Let’s talk about each type in detail.
Advertising fraud
In this type of fraud, fraudsters act like publishers or regular affiliate marketers but generate fake clicks. An advertiser thinks there are real users behind the clicks and pays a ‘publisher,’ meaning they lose money for nothing.Subcategories of advertising fraud include:
- Click-spamming, or click-flooding: This is when fraudsters generate a large number of clicks with the help of dedicated software.
- Click-injection: This type of fraud is connected to intercepting a user’s click. Scammers use an app to identify when a user installs another app and trigger clicks right before the install is fully completed.
- Device farms: Here, the fraudsters use tons of devices that create repeated actions such as registrations and installs, so an advertiser thinks there is some actual activity, but there isn’t.
DCB fraud
With DCB fraud, scammers primarily aim at end-users. Fraudsters trick users into unwanted payments by manipulating or using dedicated software. Manipulations relate to social engineering fraud, while software usage is technical fraud.Social engineering fraud
Social engineering fraud is simply the deception or manipulation of information a user receives. Fraudsters use misleading information to fool people, which cannot be controlled with technical means.Examples include misinformation when a user receives misleading information and purchases something they otherwise wouldn’t buy if they knew the correct information. There might be a misleading call-to-action that says «Play now» and triggers a payment once clicked (1 click flow.)
Some deliberately fake ads such as «You have won X sum of money» lead to additional steps and undesired purchases, which is a misleading incentive.
Another subtype of social engineering fraud is trust manipulation, when scammers use a logo of a famous brand or an identity of a prominent person to trick a user into an unwanted purchase.
Technical DCB fraud
When it comes to technical DCB fraud, scammers intercept a user’s phone to start a subscription that a person is unaware of. Some types of technical fraud include:- Malicious app fraud: Fraudsters make a user believe they have downloaded a real app, and when downloaded, the malicious app takes a user’s money without them knowing.
- Code injection: This is when a user clicks on a link that contains malware, and the dedicated code makes the device make a payment.
- Clickjacking: Fraudsters intercept a user’s click: when a person clicks somewhere on a page, it redirects them to a page segment that creates an unwanted payment.
- Spoofing: Scammers try to control a SIM card or a user’s identity to set up undesired subscriptions.
Best practices to fight mobile content fraud
How to mitigate the mVAS fraud? Here are some ideas that might help:- You should always check your traffic sources. Be attentive to traffic you receive, as your partners might not have cleaned it.
- Appoint a person from your team as an anti-fraud manager. Make sure your company has a detailed anti-fraud strategy.
- Audit the risks by checking out problematic GEOs, billing flows, and traffic sources.
- Work with independent anti-fraud companies as they can help you grow. Anti-fraud specialists will share their expertise to make your company’s workflow smoother.
- Set up strict rules and block any partner that brings in fraudulent traffic.
- Prevent fraud before it occurs, and don’t panic when it does, as there is always a chance it might happen to you.