Our tools monitor millions of native, push, pop, and TikTok advertising campaigns.
Get StartedRunning non-compliant ad campaigns is nothing new. Many online advertisers try to skirt the rules established by ad-networks to run campaigns that are not permitted by that ad-network. We see many examples of such campaigns on a daily basis on our spy platform.
The most commonly employed technique involves disguising the ad copy with text and images that don't raise any flags. This is followed by creating a fake or an innocuous landing page that is shown to the compliance team while directing the traffic to the actual money making page to the majority of audience. This is referred to as cloaking within advertising community.
Let's look at a hypothetical example. Online gambling is illegal in the United States. Therefore, an advertiser is prohibited from showing gambling ads to US audience as it is illegal. There are many offshore online gambling platforms that are looking for US based clients. So either they themselves or their affiliates will try to run such ad campaigns using cloaking techniques.
One of the earliest cloaking technique involved showing a compliant landing page during the campaign approval process and the URL was then redirected to a non-compliant page after the campaign was approved. As you can imagine, such a technique is very easy to detect and black-hat advertisers started coming up with more sophisticated techniques. This can include identifying "suspicious" traffic using visitor IP address, looking at http headers for inconsistencies, running javscript checks to see if the traffic is originating from a mobile device or an emulator etc.
In this article, we are going to reveal one of the most complex and frankly jaw dropping cloaking technique that was first revealed by folks at bidfilter. It consists of multiple steps and checks that include some fascinating methods such as steganography, extreme obfuscation and clever javscript injection.
Before we detail the steps, let's take a look at the flow-chart below that makes it easier to understand the entire process:
Below are the links for the original whitepaper from bidfilter and high resolution pdf of the flow-chart, if you are interested.
White Paper: Original Whitepaper from BidFilter
Flowchart: High Resolution Flowchart in PDF format
As the author of the whitepaper noted, this by far is the most extreme example of the malicious ad serving that they have ever seen. I think it is safe to assume that this is not the last time we will see this. Ad-networks will have to step up their game if they are serious about fighting this kind of spam.
Π’Π΅Π³ΠΈ
ΠΠΎΠ»ΡΡΠ°ΠΉΡΠ΅ Π»ΡΡΡΠΈΠ΅ ΠΊΠΎΠ½Π²Π΅ΡΡΠΈΠΎΠ½Π½ΡΠ΅ Π»Π΅Π½Π΄ΠΈΠ½Π³ΠΈ ΠΊΠ°ΠΆΠ΄ΡΡ Π½Π΅Π΄Π΅Π»Ρ Π½Π° ΡΠ²ΠΎΡ ΠΏΠΎΡΡΡ.
None
ΠΠΎΠ½ΠΈΠΌΠ°Π½ΠΈΠ΅ ΡΠ΅Π°ΠΊΡΠΈΠΈ ΠΏΠΎΡΡΠ΅Π±ΠΈΡΠ΅Π»Π΅ΠΉ Π½Π° ΡΠ΅ΠΊΠ»Π°ΠΌΠ½ΡΠ΅ ΠΏΡΠ±Π»ΠΈΠΊΠ°ΡΠΈΠΈ Π·Π°ΠΊΠ»ΡΡΠ°Π΅ΡΡΡ Π½Π΅ ΡΠΎΠ»ΡΠΊΠΎ Π² ΠΎΡΡΠ»Π΅ΠΆΠΈΠ²Π°Π½ΠΈΠΈ ΠΎΡΠΌΠ΅ΡΠΎΠΊ Β«Π½ΡΠ°Π²ΠΈΡΡΡΒ» ΠΈ ΡΠ΅ΠΏΠΎΡΡΠΎΠ², Π½ΠΎ ΠΈ Π² Π³Π»ΡΠ±ΠΎΠΊΠΎΠΌ ΠΏΠΎΠ³ΡΡΠΆΠ΅Π½ΠΈΠΈ Π² ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΠΈΡ, ΠΊΠΎΡΠΎΡΠ°Ρ Π»Π΅ΠΆΠΈΡ Π² ΠΎΡΠ½ΠΎΠ²Π΅ Π²ΠΎΠ²Π»Π΅ΡΠ΅Π½Π½ΠΎΡΡΠΈ ΠΈ ΡΠ΅ΡΠ΅Π½ΠΈΠΉ ΠΎ ΠΏΠΎΠΊΡΠΏΠΊΠ΅.
Dan Smith
7 ΠΌΠΈΠ½ΡΠ½Π². 21, 2025
Case Study
TikTok emerged ΠΊΠ°ΠΊ ΠΌΠΎΡΠ½Π°Ρ ΡΠ΅ΠΊΠ»Π°ΠΌΠ½Π°Ρ ΠΏΠ»Π°ΡΡΠΎΡΠΌΠ° Π΄Π»Ρ ΠΏΡΠ΅Π΄ΠΏΡΠΈΡΡΠΈΠΉ ΡΠ»Π΅ΠΊΡΡΠΎΠ½Π½ΠΎΠΉ ΠΊΠΎΠΌΠΌΠ΅ΡΡΠΈΠΈ, ΡΡΡΠ΅ΠΌΡΡΠΈΡ ΡΡ ΡΠ²Π΅Π»ΠΈΡΠΈΡΡ ΠΏΡΠΎΠ΄Π°ΠΆΠΈ ΠΈ ΡΠ°ΡΡΠΈΡΠΈΡΡ ΡΠ²ΠΎΡ ΠΊΠ»ΠΈΠ΅Π½ΡΡΠΊΡΡ Π±Π°Π·Ρ. ΠΡΠΎ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΠ΅ ΠΈΠ· ΠΠ΅ΡΡ Π΄Π΅ΠΌΠΎΠ½ΡΡΡΠΈΡΡΠ΅Ρ ΠΎΠ³ΡΠΎΠΌΠ½ΡΠΉ ΠΏΠΎΡΠ΅Π½ΡΠΈΠ°Π» TikTok Π΄Π»Ρ ΠΏΡΠ΅Π΄ΠΏΡΠΈΡΡΠΈΠΉ ΡΠ»Π΅ΠΊΡΡΠΎΠ½Π½ΠΎΠΉ ΠΊΠΎΠΌΠΌΠ΅ΡΡΠΈΠΈ.
Kulwant Nagi
7 ΠΌΠΈΠ½ΠΈΡΠ». 14, 2024
Featured
Jairene Cruz
7 ΠΌΠΈΠ½Π°ΠΏΡ. 25, 2024