Microsoft Alert a Major Click Fraud Scheme Targeting Gamers

Microsoft is keeping tabs on a widespread click fraud scheme that targets gamers and uses covertly installed browser extensions on hacked devices.
The act of exaggerating the number of clicks on pay-per-click advertisements that constitutes a fraudulent click. According to experts, botnets are responsible for approximately a third of the traffic created by advertising on ad networks. To safeguard their image and keep their clients happy, advertising platforms frequently use click fraud prevention techniques, such as the Google search engine. 
In a series of tweets over the weekend, Microsoft Security Intelligence stated that “attackers monetize clicks generated by a web node WebKit or malicious browser extension stealthily installed on devices.”
The internet company clarified in a tweet that the initiative targets unaware people who click rogue advertising or comments on YouTube. 
By doing this, a fake game cheats ISO file will be downloaded, and when opened, it will install the threat actors’ necessary browser node-webkit (NW.js) or browser extension. Microsoft also mentioned that they saw the actors using Apple Disk Image files, or DMG files, indicating that the campaign is a cross-platf

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: