{"id":4740,"date":"2018-06-30T00:59:54","date_gmt":"2018-06-30T00:59:54","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/"},"modified":"2018-06-30T00:59:54","modified_gmt":"2018-06-30T00:59:54","slug":"the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/","title":{"rendered":"The cybercriminal&#8217;s cash cow and the marketer&#8217;s machine: Inside the mad sad bad web ad world"},"content":{"rendered":"<p><strong class=\"trailer\">Special report<\/strong> Digital ad fraud is potentially lucrative, difficult to detect, and getting worse.<\/p>\n<p>&#8220;It is one of the biggest ways bad guys have of pulling money out of the online economy,&#8221; said Louis-David Mangin, co-founder and CEO of Confiant, a firm that helps publishers mitigate the damage done by hosting bad ads, in a phone interview with <em>The Register<\/em>. &#8220;It&#8217;s definitely getting worse.&#8221;<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.slideshare.net\/augustinefou\">Augustine Fou<\/a>, a cybersecurity and ad fraud researcher who advises companies about online marketing, makes a similar point in a report he plans to publish on Monday.<\/p>\n<p>&#8220;Ad fraud is the most lucrative way to cash out of other major criminal activities,&#8221; his report, provided in advance to <em>The Register<\/em>, reads.<\/p>\n<p>It&#8217;s nearly the perfect crime in the sense that it often goes unnoticed and hasn&#8217;t been as high a law enforcement priority as other online threats. Some industry experts talk about digital ad fraud as if it were legal, though they don&#8217;t really mean it.<\/p>\n<h3 class=\"crosshead\"><span>Illegal, or is it<\/span><\/h3>\n<p>Fou has in the past claimed <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.linkedin.com\/pulse\/digital-ad-fraud-legal-augustine-fou-phd-cybersecurity-researcher\/\">digital ad fraud is legal<\/a>, and he says something similar in his latest findings.<\/p>\n<p>&#8220;Ad fraud isn&#8217;t illegal (no laws pertain to it) but other laws may be broken in the committing of it,&#8221; his report says.<\/p>\n<p>&#8220;Ad fraud is against the terms of service of most ad exchanges, so it\u2019s almost certainly a breach of contract,&#8221; said Ratko Vidakovic, founder and principal consultant at AdProfs, ad tech consultancy based in Toronto, Canada, in an email to <em>The Register<\/em>.<\/p>\n<p>&#8220;Then again, plausible deniability is always on the table, so it&#8217;s very hard to prove that a publisher is deliberately engaging in ad fraud without a rigorous investigation. To my knowledge, it\u2019s not explicitly illegal. Although, I&#8217;m sure some could argue that it constitutes wire fraud, or violates any number of computer crime laws.&#8221;<\/p>\n<p>While online ad fraud may not be specifically defined as a crime, it is nonetheless fraud, and is actionable at least under US law. What&#8217;s more, there are various statutes that can be brought to bear related to computer crimes, money laundering and the like, depending on the circumstances.<\/p>\n<p>Asked about this, Fou said what he means is that digital ad fraud isn&#8217;t often prosecuted.<\/p>\n<h3 class=\"crosshead\"><span>A tsunami of scams<\/span><\/h3>\n<p>Digital ad fraud can mean many different things. It can involve fake websites, fake online traffic, fake ads, fake ad agencies, fake audiences, fake ad bidding, fake accounts, fake devices, fake apps, and fake data.<\/p>\n<p>It&#8217;s not just click fraud \u2013 bots clicking on ads or loading display ads to get paid. It may involve installation fraud, by which physical or virtual devices download and install apps, cycling through fake device identifiers to collect the installation payment from the app publisher. Or it may involve showing ads that paid to reach a high-value audience to a low-value audience.<\/p>\n<p>AdProfs <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/adprofs.co\/beginners-guide-to-digital-ad-fraud\/#what\">describes<\/a> some of the variations: invisible ads, traffic arbitrage (buying low-value traffic and reselling it for more than it&#8217;s worth), domain spoofing (bad publishers misidentifying their sites), site bundling (bad publishers bundling networks of domains under a single ad network identifier), ad injection, cookie stuffing (to get credit for affiliate fees), and click farms.<\/p>\n<p>Of course, before anyone asks, <em>El Reg<\/em>&#8216;s highly capable ad operations team works hard around the clock to ensure our ads are not only served to and seen by millions of real eyeballs each month, but are also high quality and safe.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2016\/12\/20\/shutterstock_ad_billboards_small.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"malware\"\/><\/p>\n<h2 title=\"Software nasty is packed with exploits for vulnerabilities in home broadband boxes\">Evolved DNSChanger malware slings evil ads at PCs, hijacks routers<\/h2>\n<p><a href=\"https:\/\/www.theregister.co.uk\/2016\/12\/20\/new_dnschanger_exploit_kit_goes_after_166_types_of_router\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>There is at least agreement that digital ad fraud happens, though not everyone considers it all that serious. A 2017 report by the Association of National Advertisers (ANA) put bot fraud losses at $6.5bn in 2017, down 10 per cent from $7.2bn in 2016.<\/p>\n<p>The ANA report said 9 per cent of desktop display ad spending and 22 per cent of desktop video ad spending is lost to fraud. It dismisses mobile ad fraud as less than 2 per cent of spending, while noting &#8220;this does not include fraud in mobile web video or pay-per-click fraud, which remain high and problematic.&#8221;<\/p>\n<p>Juniper Research last year <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.businesswire.com\/news\/home\/20170926005177\/en\/Juniper-Research-Ad-Fraud-Cost-Advertisers-19\">predicted<\/a> $19bn will be lost to digital ad fraud in 2018.<\/p>\n<p>But ad fraud statistics offer an incomplete picture of what&#8217;s going on because they tend to focus on one specific segment of the industry while omitting others. Fou, who said he has stopped estimating ad fraud as a percentage, <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/08\/17\/ad_fraud_looks_really_bad\/\">previously said<\/a> 43 per cent of mobile display ad impressions were bogus.<\/p>\n<p>Others have suggested about <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.adweek.com\/tv-video\/over-half-of-paid-programmatic-impressions-probably-arent-viewed-by-an-actual-person\/\">half of paid programmatic impressions<\/a> are fake.<\/p>\n<h3 class=\"crosshead\"><span>Call in the lawyers<\/span><\/h3>\n<p>Digital ad fraud litigation is not very common, but it does occur.<\/p>\n<p>The US Justice Department brought <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.justice.gov\/usao-sdny\/programs\/victim-witness-services\/united-states-v-vladimir-tsastsin-et-al-11-cr-878\">a click fraud case<\/a> against six Estonian nationals and one Russian national in 2011. There have been a handful of other criminal click fraud cases, such as one in 2017 against <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.justice.gov\/usao-edny\/pr\/cybercriminal-who-created-global-botnet-infected-malicious-software-extradited-face\">Fabio Gasperini<\/a>.<\/p>\n<p>There have also been a few notable civil cases as well. Google <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/12\/13\/google_click_fraud_lawsuit\/\">settled a click fraud claim<\/a> by Lane&#8217;s Gifts and Collectibles in 2006 for $90m and in 2017 settled <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/adwordsclassaction.com\/\">another click fraud case<\/a> covering the 2004 through 2008 period for $22.5m. Last year, Uber <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2017\/09\/19\/uber_sues_ad_firm\/\">sued ad biz Fetch<\/a> alleging click fraud.<\/p>\n<p>One reason for the scarcity of lawsuits, Fou and others have argued, is that there&#8217;s an industry incentive to maintain the status quo.<\/p>\n<p>&#8220;This is because marketers want the fraud to continue,&#8221; Fou explained in an email to <em>The Register<\/em>. &#8220;If they cut out the fraud there will be less impressions to buy.&#8221;<\/p>\n<p>Some marketers, at least.<\/p>\n<p>&#8220;Certainly some buyers like cheap inventory and don&#8217;t care to ask too many questions, said Ben Edelman, an associate professor at the Harvard Business School who had conducted many ad fraud investigations over the years, in an email to <em>The Register<\/em>.<\/p>\n<p>&#8220;But that&#8217;s not typical. In my experience most advertisers care about results \u2013 they have products to sell, which requires finding real buyers, which requires quality advertising inventory that real people see and engage with. In my view, that&#8217;s as it should be.&#8221;<\/p>\n<p>&#8220;There is no direct incentive from anyone in the industry, with the exception of marketers, to eradicate ad fraud,&#8221; observed Vidakovic. &#8220;That said, it\u2019s hard to generalize the industry\u2019s will in such a way.&#8221;<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/06\/29\/ad_fraud_bad\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We peek behind the curtain of banners and gimmicks that go too far Special report\u00a0 Digital ad fraud is potentially lucrative, difficult to detect, and getting worse.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":4741,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-4740","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The cybercriminal&#039;s cash cow and the marketer&#039;s machine: Inside the mad sad bad web ad world 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The cybercriminal&#039;s cash cow and the marketer&#039;s machine: Inside the mad sad bad web ad world 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-30T00:59:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The cybercriminal&#8217;s cash cow and the marketer&#8217;s machine: Inside the mad sad bad web ad world\",\"datePublished\":\"2018-06-30T00:59:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/\"},\"wordCount\":1074,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/\",\"name\":\"The cybercriminal's cash cow and the marketer's machine: Inside the mad sad bad web ad world 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg\",\"datePublished\":\"2018-06-30T00:59:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The cybercriminal&#8217;s cash cow and the marketer&#8217;s machine: Inside the mad sad bad web ad world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The cybercriminal's cash cow and the marketer's machine: Inside the mad sad bad web ad world 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/","og_locale":"en_US","og_type":"article","og_title":"The cybercriminal's cash cow and the marketer's machine: Inside the mad sad bad web ad world 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-30T00:59:54+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The cybercriminal&#8217;s cash cow and the marketer&#8217;s machine: Inside the mad sad bad web ad world","datePublished":"2018-06-30T00:59:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/"},"wordCount":1074,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/","url":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/","name":"The cybercriminal's cash cow and the marketer's machine: Inside the mad sad bad web ad world 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg","datePublished":"2018-06-30T00:59:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-cybercriminals-cash-cow-and-the-marketers-machine-inside-the-mad-sad-bad-web-ad-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The cybercriminal&#8217;s cash cow and the marketer&#8217;s machine: Inside the mad sad bad web ad world"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=4740"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/4740\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/4741"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=4740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=4740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=4740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}