Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

US Recovers $15 Million From Ad Fraud Group

United States authorities announced this week that they have retrieved more than $15 million in illicit proceeds derived from the advertising fraud scheme known as “3ve.”

United States authorities announced this week that they have retrieved more than $15 million in illicit proceeds derived from the advertising fraud scheme known as “3ve.”

Consisting of three different sub-operations – the Kovter botnet and two other operations – the 3ve scheme was dismantled in 2018, when authorities announced charges against three involved individuals: Aleksandr Isaev, of Russia, and Sergey Ovsyannikov and Yevgeniy Timchenko, of Kazakhstan.

Ovsyannikov and Timchenko were arrested in 2018 and extradited to the United States, where they pleaded guilty and have been sentenced. Isaev is still at large.

According to documents presented in court, between December 2015 and October 2018, the three ran the fraud scheme known as 3ve, 3ve.2 Template A, or Eve, which relied on a botnet of infected computers to perpetrate digital advertising fraud.

Using tens of command and control (C&C) servers, the individuals accessed over 1.7 million infected systems in the US and abroad and used hidden browsers on these machines to load ads into fabricated webpages.

The scheme resulted in billions of ad views being falsified, and in more than 86,000 domains being spoofed. Thus, organizations paid over $29 million for ads never viewed by real users, the US Department of Justice says.

The US says that $15.1 million in such illicit proceeds were recovered from accounts that the perpetrators had opened at banks in Switzerland.

In 2018, authorities targeted the infrastructure used in the scheme, where they were able to sinkhole 23 domains and take over 89 servers related to the Kovter botnet.

While investigating the 3ve fraud scheme, they also identified the infrastructure associated with the Boaxxe ad fraud scheme, and were able to disrupt it as well.

The US also indicted Aleksandr Zhukov, Boris Timokhin, Mikhail Andreev, Denis Avdeev, and Dmitry Novikov, five Russian nationals who allegedly ran the Methbot ad fraud operation, which is believed to have generated more than $7 million in illicit proceeds to the fraudsters.

Related: Ad Fraud Operation Accounted for Large Amount of Connected TV Traffic

Related: Facebook Sues Chinese Company Over Ad Fraud

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Cybercrime

Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.

Cybercrime

Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.

Ransomware

US government reminds the public that a reward of up to $10 million is offered for information on cybercriminals, including members of the Hive...