© Bigabid

Click Injection

What is Click Injection?

Click injection is a sophisticated form of click-spamming. By publishing (or having access to) an Android app that listens to “install broadcasts,” fraudsters detect when other apps are downloaded and trigger clicks before an install completes. The fraudster then receives credit for installs as a consequence. If fraud prevention tools are inadequate, individuals who commit click injection fraud can take advantage of a low-quality app to take control of a device at a strategic moment (and with the necessary data) in order to produce a false advertisement click that looks genuine, causing payouts based on cost per install (CPI).

How does click injection work?

The click injection technique is often employed by fraudulent actors through the use of “junk apps” installed on a user’s device. These apps lay dormant until an installation broadcast activates them, allowing them to take control of the user’s device and generate false clicks that steal credit for organic or non-organic installs generated by other networks.

Aside from the financial damage caused by draining advertising budgets, click injection can have serious implications for advertisers’ future targeting and segmentation of traffic. It can distort the planning and distribution of ad spend by highlighting fraudulent sources ahead of legitimate ones.

Click Injection vs. Click Spamming

Perpetrators of click spamming bombard an MMP with millions of clicks, hoping to trigger a misattribution event and secure a payout. Click injection, a more aggressive variant from the same lineage, differs because the clicks are not transmitted before the installation but immediately after it begins in earnest.

This technique is more sophisticated than click spamming as it increases the likelihood of a successful misattribution since the fraudulent click is sent at a point in time when the genuine installation is already in progress.
Contact us
Please fill out the form below to submit your interest.
Join Our Newsletter
Please review our privacy practices: read privacy policy.