0% found this document useful (0 votes)
100 views40 pages

IAB EY Report

Report on brand safety

Uploaded by

Andres Nieto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views40 pages

IAB EY Report

Report on brand safety

Uploaded by

Andres Nieto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

What is an

untrustworthy supply
chain costing the US
digital advertising
industry?
IAB US benchmarking study

November 2015
Table of contents

Study background 1

Cost impact summary 2

Key findings 3
Infringed content 4
Malvertising+ 16

Invalid traffic 26

ii
Study background
In 2015, the Interactive Advertising Bureau (IAB) The research methodology for the study included:
commissioned EY’s Media & Entertainment Advisory
practice to perform a comprehensive study that estimated • Study of studies — We assessed a number of studies
the cost impact of an untrustworthy digital advertising that other organizations have conducted in relevant
supply chain in the US. MediaLink, a strategic consulting supply chain areas over the last several years. We have
firm, assisted the IAB in organizing and administering referenced key reports to estimate certain costs.
the study. • Voice of the industry — We selected and contacted 90
A supply chain is a complex economic system of people, supply chain companies, including both publishers and ad
processes and resources from different companies tech companies, to complete a comprehensive 13-page
involved in moving a product from the start of the system questionnaire that included qualitative and quantitative
through the delivery to the consumer. For the purposes areas. Of the 90 contacted, 30 companies completed the
of this study, we considered the digital advertising supply questionnaire.
chain (i.e., moving an advertising creative through the • Data analytics — For several specific areas, we obtained
internet until it reaches a consumer’s browser) and the data directly from third-party measurement and analytic
digital media supply chain (moving content through the organizations to estimate certain costs.
internet until it reaches a consumer’s browser).
EY conducted this study independently on behalf of the
The IAB wanted to better understand the impact of IAB. EY did not audit the information provided to us and
deliberate activities designed to exploit the current state provides no opinion or other forms of assurance with
of the supply chain for illicit gain. It also wanted to know respect to the report’s findings.
more about the repercussions of unintentional activities
by businesses that have put digital advertising as a Finally, we wish to say thank you and express our gratitude
legitimate business in jeopardy. to the following IAB sponsors of this study:
EY conducted part one of the study between March and Premier Supporting Participating
September 2015. This included areas that have a high AppNexus PubMatic OpenX
degree of illegal activity — infringed content, malvertising MediaMath Xaxis PulsePoint
and invalid traffic. We will undertake part two of the study Rocket Fuel Inc. YuMe Videology
in early 2016, when we will focus on media transparency,
reputational impact and brand safety.
Based on the results of phase one of the survey, EY has:
1. I dentified areas of corruption in the digital
advertising supply chain
stimated the commercial cost impact to
2. E
the ecosystem

1
Cost impact summary — $8.2b*

Cost impact — $1.1b/13%


Cost impact — $4.6b/56%
• Lost revenue from malware-related ad blocking: $781m (page 22)
• Costs to advertisers: $4.4b (page 33)
• Cost from direct incidents: $204m (page 20)
• Cost to fight: $169m (page 35)
• Lost revenue from blacklisting: $57m (page 21)
• Cost to fight: $17m (page 20)

Ma
fic
raf

lve
Invalid t

Cost rtisi
summary Types of ng+
by type corruption
Incurred costs

$4.8b
Inf n t
estimated cost
ring conte
ed
59%
Lost revenue
opportunity costs Cost impact — $2.5b/31%
• Lost ad and pay-for-content revenue: $2.4b (page 8)
$3.4b • Lost revenue from password sharing: $48m (page 12)
estimated cost • Cost to fight: $33m (page 14)

41%
Note: The page numbers above contain a detailed explanation of our estimation approaches.

* All amounts are in US dollars.

2
Key findings
• Each studied category has an estimated cost impact above • At $2.4 billion, infringed content represents the most
$1 billion. Individually, they represent significant costs to significant portion of lost revenue opportunity costs. One
the industry that should not be ignored. However, as each key feature that drives consumers to infringed content is
category can be interrelated, they need to be considered the desire and ability to access recently distributed content
collectively and equally when being addressed by the at no direct cost in the convenience of their homes. It
industry. An excellent example is a consumer who visits is hard to say what the impact would be to distribution
an infringed content site containing malware that infects channels if access were eliminated. Would consumers
the consumer’s browser with a robot that is later used turn to ad-supported or pay-for-content channels? How
to drive invalid traffic. If the industry can eliminate the many would actually become paying customers? There’s
profits earned by serving ads next to infringed content, it no conclusive way of knowing. However, our approach
can reduce the amount of money available to drive illegal suggests a potential advertising revenue increase of $456
activities in the supply chain. It also has the opportunity to million and a potential pay-for-content revenue increase
disrupt the corruption life cycle related to invalid traffic. To of $2 billion for the industry. The $2 billion represents
help the industry reclaim some of the $8.2 billion in costs, approximately 21 million US consumers who would be
EY believes that an improvement in some fundamental willing to spend $8 a month on what is currently classified
practices, such as knowing your business partners and as infringed content. Unless the industry collectively takes
investigating new relationships using address information, significant steps, there is a likelihood that the number of
tax IDs and background checks, is critical. infringed content consumers will continue to increase.
Improving technology and bandwidth that make it easier for
• At $4.4 billion, costs to advertisers from invalid traffic
consumers to obtain content, aids to protect the anonymity
represent the most significant portion of incurred costs.
of users, and an increasing culture of moral acceptance
In terms of distribution, 70% of the costs relate to
by consumers are all contributing factors. At the same
performance-based pricing models, such as cost-per-click
time, it is becoming increasingly difficult for consumers to
(CPC) and 30% relate to cost per month (CPM) based pricing
determine whether content is truly infringed. And even if
models’ costs. Related to consumer consumption, currently
they can tell the difference, they have a diminishing fear of
72% of the costs are from desktop and 28% are from
legal repercussions.
mobile. We also noted a range of rates (e.g., CPM-based
mobile video has a 12.1% invalid traffic rate while CPM- • The remaining areas representing 16% of the total are
based display desktop has a rate of 6.6%). As the digital estimated at $1.4 billion. These areas include the cost to
advertising industry continues to be dynamic related fight illegal activities, lost revenue from password sharing,
to pricing models, consumer consumption by delivery lost revenue from search engine blacklisting when a website
platforms and pricing by ad units, assessing the invalid is impacted by malware and lost revenue from malware-
traffic costs to advertisers, should holistically consider related ad blocking.
the rapid changes to business and fraud approaches.

“The industry needs to deal with the problem effectively


and the fraud needs to be put to its death.”
Bob Liodice, Association of National Advertisers President and CEO,
interviewed by Beet.tv, 26 February 2015.

3
Infringed
content
4
Infringed content landscape
Ad injection P2P community
This is a toolbar or adware that alters the site HTML A peer-to-peer (P2P) community
prior to the browser rendering a served impression. allows users to browse for files on
Primary revenue: Advertising websites linking to content hosted
Major content: Display content by other connected computers
or servers via a peer-to-peer
distribution system.

Storefront community Primary revenue: Advertising


Ancillary revenue: Donations
Major content: Music, movies,
In a storefront community, users can purchase and software, games, text and TV programs
download digital media from the site’s own servers.
Primary revenue: Transactions
Ancillary revenue: Advertising
Major content: Music, movies, software, games, text and TV programs

Subscription Freemium community


community Freemium communities give users access to P2P links
or direct downloads of curated digital media content for
Subscription communities allow users free. It also enables them to pay or contribute content
to browse for files on websites linking to the site for additional content access and/or quality.
to content hosted by other connected Primary revenue: Subscriptions
computers or servers via a P2P Ancillary revenue: Advertising and donations
Major content: Music, movies, software, games, text
distribution system.
and TV programs
Primary revenue: Advertising
Ancillary revenue: Donations
Major content: Music, movies, software,

Embedded streaming
games, text and TV programs

Embedded streaming offers a hosting site where


users can upload and directly stream video content.
Primary revenue: Advertising
Ancillary revenue: Donations and subscriptions
Major content: Music, movies and TV programs
Live TV streaming
Live TV streaming provides links to direct
streams of live free-to-air and pay-per-
view TV (including sporting events).
VPN and proxy piracy
Virtual private network (VPN) and proxy piracy
Primary revenue: Advertising
Ancillary revenue: Donations enables users to access content illegally by
Major content: Live TV bypassing geolocation licensing restrictions.
There is likely no direct revenue to criminals.
However, it could impact geo-targeting and
measurement.
Major content: Movies and TV programs

5
Comprehensive description • P2P community. This allows users to browse for files on
websites that link to content hosted by other connected
Online digital piracy is the illegal practice of using the computers or servers via a peer-to-peer distribution system.
internet (via mobile, PC or other device) to access infringed Users can generally download the desired content files for
content via websites and peer-to-peer networks. Content free as the communities are largely ad-supported, although
may include videos, live events, music, video games, text, some also accept donations from users for financial support.
software and applications. From a business perspective, The industry should pay special attention to newer infringed
copyright infringement operators generate revenue through content distribution platforms that combine P2P and
advertising, subscriptions, donations and transactions. streaming characteristics and allow users to access video
and music content using a clean and legitimate-looking
Broad digital infringed content categories include:1
application. These platforms differ from traditional P2P
• Ad injection. This is a toolbar or adware that alters the site platforms in that they stream as components are delivered
HTML prior to the browser rendering a served impression by other P2P participants rather than assembling a chosen
without permission or compensation to the website or file first and then storing it on a user’s PC hard drive.
content owner. • Storefront community. In a storefront community, users
• Embedded streaming. Embedded streaming offers a can purchase and download digital media from the site’s own
hosting site where users can upload and directly stream servers. These sites are generally ad-supported or fee-based.
video content. Generally, these sites are financially • Subscription community. Subscription communities allow
supported by digital advertising, subscriptions and users to browse for files on websites linking to content
donations. hosted by other connected computers or servers via a P2P
• Freemium community. Freemium communities give users distribution system. They provide links or direct downloads of
access to P2P links or direct downloads of curated digital curated digital media content (with the exception of free-to-
media content for free. They also enable users to pay or air and pay TV) typically for a subscription fee. Alternatively,
contribute content to the site for additional content access these communities may be ad-supported.
and/or quality. • VPN and proxy piracy. VPN and proxy piracy enables users
• Live TV streaming. Live TV streaming provides links to access content illegally by giving global users access to
to direct streams of live free-to-air and pay-per-view certain US-based digital content illegally (e.g., video content
TV, including sporting events. These sites are largely from OTT services) by paying the subscription fee and then
ad-supported, although some also accept donations bypassing geolocation restrictions. This corruption area is
from users for financial support. exacerbated by complicated video licensing agreements in
which a legal OTT service will have a different content library
depending on the country.

Additionally, there is the issue of password sharing between


family members or individuals who are resource pooling
to expand their content access. VPN and proxy piracy can
sometimes be combined with password sharing to create
a different level of corruption (e.g., a user living in another
country uses a US VPN to access an OTT service by obtaining
a password from someone who lives in the US).

1. The six business models for copyright infringement — A data-driven study of websites considered to be infringing copyright, a Google and PRS for Music
commissioned report with research conducted by BAE Systems Detica, 27 June 2012.

6
Infringed content
Key drivers of infringed content Industry initiatives to combat
Factors that impact the growth of infringed content infringed content
consumption can be divided into two groups:
To fight back, some current industry initiatives include:2
• Infringed content site factors:
• Participate in the Association of National Advertisers
• Profitable with a low cost of entry (ANA) and American Association of Advertising Agencies’
• W
ell-organized business models that new entrants can (4A’s) Statement of Best Practices to Address Online Piracy
easily replicate and Counterfeiting. These leading practices recommend
• A
n expanding digital universe that brings more potential that marketers and their agencies include the following
consumers who may use the infringed content market for conditions in media placement contracts and insertion
some of their own content orders with ad networks and other intermediaries involved
in their US-originated digital advertising campaigns on both
• I mproving bandwidth that makes it easier for certain
infringed content approaches domestic and foreign internet sites:

• A
growing acceptance of infringed content use by • All such intermediaries shall use commercially reasonable
consumers measures to prevent ads from being placed on those sites
dedicated to the infringement of the intellectual property
• An increasing number of support-oriented companies rights of others because they have no significant, or only
that provide tools to users limited, use or purpose other than engaging in, enabling
or facilitating such infringement.
• Infringed content user factors:
• All such intermediaries should implement commercially
• Increasing demand for content without waiting for a reasonable processes for removing or excluding
release or the next episode such sites from their services and for expeditiously
• Desire for lower content costs terminating noncompliant ad placements in response to
reasonable and sufficiently detailed complaints or notices
• Desire to access content remotely
from rights holders and advertisers.
• Improving technology and bandwidth making it easier to
• All such intermediaries should refund or credit the
obtain infringed content
advertiser for the fees, costs and/or value associated
• Resistance to paying for content with advertisements with noncompliant ad placements or provide alternative
• Easy availability of tools that protect the anonymity of remediation.
infringed content users • Participate in best practices for ad networks to address
• An increasing culture of moral acceptance built on years piracy and counterfeiting, which recommends ad networks:
of receiving a high degree of free content in other areas • Maintain policies that prohibit websites dedicated to
• Difficulty identifying whether content is truly infringed selling counterfeit goods or engaging in copyright
piracy from participating in the ad network’s advertising
• Lack of fear of legal repercussions
programs.
• Maintain and post the best practices guidelines on the ad
network’s website.
• Include in ad network policies language indicating that
websites should not engage in violations of law.

2. Statement of Best Practices to Address Online Piracy and Counterfeiting, The Association of National Advertisers (ANA) and the American Association of Advertising
Agencies (4A’s), 3 May 2012.

7
• Participate in an ongoing dialogue with content creators, For DAAPs to achieve TAG certification, companies must
rights holders, consumer organizations and free speech demonstrate they can provide their advertising ecosystems
advocates. (agencies and advertisers) with tools to limit their exposure
• Agree to be certified against the inventory quality to undesirable websites or other properties. They must also
guidelines from the Trustworthy Accountability Group meet one or more of the established Core Criteria for Digital
(TAG). Alternatively, maintain independent quality Advertising Effectiveness. These criteria include:3
assurance vetting and auditing processes and work to
• Identifying ad risk entities (AREs). This involves assessing
support such measures across the industry.
and identifying websites or other media properties that
• Accept and process valid, and sufficiently detailed, have a discernible risk of enabling the unauthorized
notices from rights holders or their designated agents
or illegal distribution of copyrighted materials and/or
regarding infringed content websites that may be
counterfeit goods.
participating in the ad network. Upon receipt of a valid
notice, perform an appropriate investigation into the • Preventing advertisements on undesired ad risk entities.
complaint. Take appropriate steps, such as requesting Advertisers and agencies need to be able to restrict the
the website no longer sell counterfeit goods or engage in display of their advertising on undesirable sites or other
copyright piracy, cease to place advertisements on the media properties that do not meet each advertiser’s or
website, or remove the website from the ad network. agency’s standards.
• Participation in the Digital Assurance Advertising Providers • Detecting, preventing or disrupting fraudulent or deceptive
(DAAPs) certification program of TAG. This program is for transactions. This means implementing protocols and
those ad networks and other intermediaries involved in US- capabilities to find and limit ad placements on AREs that
originated digital advertising campaigns on both domestic use fraud or deception to avoid the standards set by the
and foreign internet sites. advertiser or agency.
• Monitoring and assessing the compliance of ad placements.
This includes detecting and reporting AREs that are not in

“Clients don’t realize that


compliance with advertiser or agency instructions to allow
remedial action.

their ads are fueling the • Eliminating payments to undesired ad risk entities by using
technology and protocols to prevent payments to undesired
profits of the pirate sites.” sites and other media properties.
This program was officially launched in February 2015. As of
John Montgomery, GroupM Connect North America October 2015, no DAAPs are TAG certified.
Chairman, interviewed by Beet.tv,
16 September 2015.

3. Core Criteria for Effective Digital Advertising Assurance, Trustworthy Accountability Group, https://tagtoday.net/wp-content/uploads/2015/02/
Core-criteria_final.pdf, accessed November 2015.

8
Infringed content
Cost impact to industry Estimation approach 1: We utilized the following May 2015
usage metrics obtained directly from an analytics company
Infringed content segmentation that measures websites for purposes of identifying content
infringement related to movies, television and music:
There are four main types of digital infringed content sites:
1) direct download (DDL) sites; 2) linking sites; 3) P2P sites;
DDL Linking sites P2P Video
and 4) video streaming host sites.
streaming
In terms of estimating the cost impact, we obtained usage
data (e.g., number of downloads, unique visitors or unique 16,371,716 36,020,713 18,111,399 12,454,597
IPs) from three different sources and then applied certain rate
data (e.g., CPMs or monthly pay-for-content costs) under the The analytics company calculated the usage (surrogate for a
two principal revenue models (i.e., ad revenue model and a monthly unique visitor reach) metrics above by multiplying
pay-for-content model). For the monthly pay-for-content cost, a monthly global reach estimate (per million users across all
we used $8. This represents the additional revenue obtained sites in each category) by the estimated number of global
if infringed content was 100% eliminated. The additional internet users of 3,188,000,000 by the percentage of US
revenue could come from monthly streaming service, direct users divided by 100.
downloads of music or videos from an online store, purchased We multiplied the usage data above by an estimated monthly
video on demand, an additional cable box adapter or a ticket cost of $8 by 12 months (replicating the annual revenue from
to the movie theater. a pay-for-content revenue model) to calculate the following:
Often, consumers are attracted to infringed content
distribution channels because of the immediate access to DDL $1,571,684,736
recently distributed media, such as a new movie, song or
television series. We used multiple sources and approaches Linking $3,457,988,448
to triangulate the cost impact range to the industry. Our P2P $1,738,694,304
goal was to estimate the potential revenue that could be
earned if this content usage data was consumed at legal sites Video streaming $1,195,641,312
as opposed to infringed sites. For example, DDL sites are
Total estimated revenue $7,964,008,800
generally subscription-based with minimal advertisements. As
a result, we treated the DDL content as a legitimate channel
and assumed some banner and video ad impression activity. The analytics company also provided the following May 2015
estimated visits. These were defined as an entry to a web
domain from a different web domain or from the beginning of
an empty browsing session which expires after 30 minutes of
inactivity:

DDL Linking sites P2P Video


streaming

229,659,429 826,319,617 189,906,569 117,802,924

9
We calculated the banner ad revenue below assuming an advertising revenue that year.7 The goal of the MediaLink
$11.35 CPM4 for 12 months (to annualize the May 2015 data studies was to estimate the revenue and profit earned at
obtained) for one viewed impression per visit (a conservative the top infringing content study. For this study, we used the
assumption). The video/audio ad impression revenue volume metrics and then assumed commensurate CPMs were
estimated below assumes: a) a $21.28 CPM5 for each visitor earned for the content involved (i.e., normal CPMs for quality
(uses the usage metric above) to a content hosting site; b) an content as opposed to low-dollar CPMs, which the infringing
average usage of four times a week for 12 months; c) three content sites typically earn).
ad units viewed per half hour; and d) an average of a full hour
of consumption based on the content (e.g., movies, television DDL Linking sites P2P Video
programming). streaming

14,909,600 9,819,500 21,311,700 9,324,000


Banner Video/audio
ad revenue ad revenue Total ad
on sites on sites revenue We multiplied the monthly unique visitor data above to an
estimated monthly cost of $8 by 12 months (replicating the
DDL $31,279,614 $100,336,354 $131,615,968
annual revenue from a pay-for-content revenue model) to
Linking $112,544,732 $220,757,983 $333,302,715 calculate the following:

P2P $25,865,275 $110,998,244 $136,863,519 DDL $1,431,321,600


Video $16,044,758 $76,329,741 $92,374,499
Linking $942,672,000
streaming

Total $185,734,379 $508,422,322 $694,156,701


P2P $2,045,923,200
estimated
ad revenue Video streaming $895,104,000

Total estimated revenue $5,315,020,800


Estimation approach 2: We used the following monthly
average unique visitor data based on Q3 2014 from a The study also provided the following estimated monthly
publicly available study performed by MediaLink on behalf average page views for sites:
of the Digital Citizens Alliance. The study, Good Money Still
Going Bad: Digital Thieves and the Hijacking of the Online DDL Linking sites P2P Streaming
Ad Business, issued in April 2015, estimated that the top
infringed sites (the top 596 infringing sites were measured) in 191,600,000 182,800,000 383,800,000 190,100,000
2014 earned $209 million in advertising revenue.6
MediaLink performed an initial study in 2013 for the same The banner ad revenue below was calculated assuming an
organization. It estimated that the major sites hosting $11.35 CPM8 for 12 months (to annualize the monthly average
infringed content earned an estimated $227 million in Q3 2014 data obtained) for one viewed impression per visit
(a conservative assumption). The video/audio ad impression

4. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
5 . Ibid.
6. Good Money Still Going Bad: Digital Thieves and the Hijacking of the Online Ad Business, Digital Citizens Alliance, https://media.gractions.com/
314A5A5A9ABBBBC5E3BD824CF47C46EF4B9D3A76/298a8ec6-ceb0-4543-bb0a-edc80b63f511.pdf, accessed November 2015.
7 . Ibid.
8. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.

10
Infringed content
revenue estimated below assumes (a) a $21.28 CPM9 for each We calculated the banner ad revenue below assuming an
visitor (uses the usage metric above) to a content hosting site; $11.35 CPM12 for one viewed impression related to each
(b) the usage is an average of four times a week for 12 months; download (a conservative assumption). The video/audio ad
(c) there are three ad units viewed per half hour; and (d) an impression revenue estimated below assumes a $21.28
average of a full hour of consumption based on the content. CPM13 be applied to the P2P downloads considering a likely
number of spots for the media type (e.g., three ad units
Banner Video/audio for a 30-minute TV show, 12 ad units for a 2-hour movie
ad revenue ad revenue Total ad and six ad units for an hour of audio play). For example, the
on sites on sites revenue
$33,362,912 estimated video ad impression revenue for TV
DDL $26,095,920 $91,375,571 $117,471,491 was calculated by dividing 522,600,000 downloads by 1,000
and then multiplying it by a CPM of $21.28 per ad unit and
Linking $24,897,360 $60,180,180 $85,077,540
then multiplying it by three spots per hour.
P2P $52,273,560 $130,611,737 $182,885,297
Banner Video/audio
Video $25,891,620 $57,143,439 $83,035,059 ad revenue ad revenue Total ad
streaming on sites on sites revenue

Total $129,158,460 $339,310,927 $468,469,387 Movies $9,144,320 $205,735,125 $214,879,446


estimated
ad revenue Music $3,506,163 $39,442,012 $42,948,174

TV $5,931,533 $33,362,912 $39,294,445


Estimation approach 3: We used the following annual usage programming
data from a P2P measurement company for 2014:
Total $18,582,016 $278,540,049 $297,122,065
estimated
Movies Music TV ad revenue

P2P downloads 805,700,000 308,900,000 522,600,000

Unique IPs 55,000,000 38,000,000 29,900,000

We divided the 2014 unique IP estimate by a factor of 5.18


(estimate of IP addresses used in the US compared to the
US population) and multiplied this factor by a cost of $8 by
12 months (replicating the annual revenue from a pay-for-
content revenue model) to calculate the following:10,11

Music revenue $704,914,286

Video revenue $1,018,656,371

Total estimated revenue $1,723,570,657

9. Ibid.
10. Regional Internet Registries Number of IP Addresses Per Country, BGP Expert, www.bgpexpert.com/addressespercountry.php, accessed September 2015.
11. Internet Usage and 2015 Population in North America, Internet World Stats, www.internetworldstats.com/stats14.htm, accessed September 2015.
12. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.
13. Ibid.

11
EY summary To calculate our final rounded estimate, we applied a 70% and
30% weight to the midpoint of the ad-supported and pay-for-
Our goal was to estimate the potential revenue that content model, respectively.
companies could earn if the industry eliminated infringed The ad-supported revenue model represented $456,144,899
content distribution channels and diverted the content of our final estimate, whereas the pay-for-content revenue
usage data and consumption to legal distribution channels. model represented $1,989,585,893 (this component of
Immediate access to recently distributed media is a key the calculation represents approximately 21 million US
driver that propels consumers toward infringed content. If consumers spending $8 per month under a pay-for-content
the industry eliminated access to the free infringed content, model with the elimination of infringed content).
consumers would likely look to different channels to fill their
We used a 30% weight for the pay-for-content model for
void. However, we cannot definitively determine the exact
conservative purposes because the price elasticity for this
mix between ad-supported and pay-for-content revenue
area is not known (i.e., quantity demand decreases as price
models (we used a 70-30 split for our calculations). As such,
increases, and it is not known absent the availability of free
to estimate the cost impact across the four categories, we
infringed content how many consumers would become a
calculated a low end, midpoint and high end under our two
paying customer).
revenue models:
To assist in evaluating the different quantity metrics above,
Pay-for-content revenue model we note the following:
• Data. Approach 1 sources provided a monthly average as
Users consuming
Dollar value infringed content* of May 2015 based on March, April and May. In Approach 2,
MediaLink provided a monthly average as of Q3 2014.
Low end $4,992,668,256 52,000,000 Approach 3 sources provided 2014 data.
Midpoint $6,631,952,976 69,000,000 • Coverage. Approach 1 sources measured tens of thousands
of sites. In Approach 2, MediaLink focused on the top
High end $8,271,237,696 86,000,000
596 infringing sites based on removal request data from
*Note: With our data sources, we were unable to de-duplicate a search engine transparency report. Approach 3 sources
individuals across segmentation (e.g., one individual included a P2P census capturing the majority of that
may consume content from P2P, DDL, linking and video universe.
streaming). As a result, the exact number of infringed content • Measurement. Approach 1 sources used Alexa data.
consumers may be lower. In Approach 2, MediaLink used comScore, Integral Ad
Science, Veri-Site and Incopro. Approach 3 sources did not
Ad-supported revenue model use any additional measurement data.

Dollar value

Low end $405,317,489

Midpoint $651,635,571

High end $897,953,652

Final rounded estimate

Total dollar $2,400,000,000


value

12
Infringed content
VPN piracy and password sharing • VPN server users skew younger (27% of ages 16 to 24
and 36% of ages 25 to 34 vs. 11% of ages 55 to 64), male
Consumers are able to illegally access digital content through (31% of males vs. 21% of females) and upper income (38%
password sharing. In some cases, this action is compounded of top quarter of income group vs. 27% of the bottom
when consumers bypass their actual geolocation by using a quarter of income group).
virtual VPN located in another geolocation. A negative side
effect of VPN usage is the accuracy impact to some passive According to a recent research report from Parks Associates,
digital measurement approaches, as well as country-based the practice of password sharing will cost the subscription
digital ad targeting. Absent a change to complex content video-on-demand (SVOD) industry more than $500 million
agreements, the corruption impact is likely to grow as servers worldwide in 2015. Six percent of US broadband subscribers
become more accessible, bandwidth strength increases and indicated they access a subscription OTT video service paid
global internet access penetration increases. for by someone outside their home.15

To estimate the cost impact, we used publicly available studies To estimate the cost impact of password sharing to the SVOD
or certain estimates quoted publicly. According to research industry in the US, we considered the following:
issued by GlobalWebIndex in the first quarter of 2015 (32 • Consumer price elasticity is not known (e.g., quantity
countries were measured):14 demand decreases as price increases, and it is not known
how many consumers would become a paying customer if
• 51% of users cited access to better entertainment content
they are currently accessing content for free).
as the number one reason for VPN usage. Many of the
other reasons related to anonymity and accessing restricted • OTT services likely already consider password sharing when
sites; however, the 7th overall reason at 22% was to access establishing their pricing strategy (e.g., monthly fee can
restricted download sites such as torrent sites (which are increase based on the number of concurrent streams).
generally used to obtain infringed content). As a result, we conservatively applied a 9.58% factor
• The highest percentage of users of VPN/proxy servers at (this factor represents the approximate percentage of
35% live in Latin America. EY considers these estimates people connected to the internet who live in the US) to the
relevant to the infringed content assessment in the US media $500 million from the Parks Associates global estimate to
market because of the growing number of people migrating calculate an estimated rounded cost impact of $48 million for
from Latin America to the US. It is possible that some family the US only.16
members remain behind and can access content remotely
EY was unable to obtain an estimate on the impact of VPN
using a VPN and a shared password.
and proxy pirates.
• There are approximately 28 million VPN server users
in the US. This puts the US in a tie with Brazil for third
place in terms of VPN server users. Only China at 157
million and India at 45 million have higher numbers of
users. EY considers these estimates relevant to infringed
content assessment in the US media market because these
individuals tend to use these servers to access torrent sites
to obtain infringed content.

14. Jason Mander and Felim McGrath, “VPNs and Proxy Servers,” GlobalWebIndex, http://www.globalwebindex.net/, accessed November 2015.
15. OTT Password Sharing Will Impact Pay-TV Network Revenue, Too, Parks Associates, www.parksassociates.com/blog/article/ott-password-sharing-will-impact-pay-tv-
network-revenue, accessed September 2015.
16. Internet Users by Country (2014), Internet Live Stats, http://www.internetlivestats.com/internet-users-by-country/, accessed September 2015.

13
Cost to fight Attitudes from publishers and ad tech organizations

The Digital Millennium Copyright Act (DMCA) is a US law that As it relates to our “voice of the industry study,” the combined
provides qualifying online service providers with a safe harbor publisher and ad tech responses identified strong support
from monetary liability for copyright infringement claims. One related to combating the issue of infringed content:
of the requirements of these safe harbor provisions is that
• 99% of respondents indicated that the placement of
the service provider remove or disable access to allegedly
advertising on sites hosting infringed content hurts the
infringing material upon receiving a request that meets
digital advertising ecosystem.
certain requirements.
• 99% say that the ad tech companies have a responsibility to
In January 2015, TorrentFreak, an online news publication
eliminate advertising on sites hosting infringed content.
dedicated to infringed content, reported that copyright
holders asked one search engine to remove more than • 99% suggest that advertisers care whether their ads appear
345,169,134 allegedly infringing links from its search engine on sites that include mainstream infringed content.
in 2014 — a 75% increase compared to the previous year.17
The overwhelming and rapid increase of takedown requests
has led content owners to rely on technology (e.g., bots),
including those used by outside agencies, to scan the internet
“It is largely useless …
for infringed content. where illegal links that
To estimate the cost impact of DMCA takedown requests,
we applied a 9.58% factor (representing the approximate are taken down reappear
percentage of people connected to the internet who live in
the US) to the 2014 requests of 345,169,134 and multiplied
instantaneously. The
it by $1 per request to estimate an overall industry estimated
rounded cost of $33,000,000.18
result is … both costly and
We conservatively selected a cost of $1 per request for increasingly pointless.”
our estimate because actual costs are not available. It also
Cary Sherman, Recording Industry Association
has been reported that for many companies, the process
of America Chairman and CEO, “Valuing Music
is automated.
in a Digital World,” Forbes.com, accessed
September 2015.

17. Google Asked to Remove 345 Million ‘Pirate’ Links in 2014, TorrentFreak, https://torrentfreak.com/google-asked-remove-345-million-pirate-links-2014-150105/,
accessed September 2015.
18. Ibid.

14
Infringed content
Furthermore, the study results for the ad tech respondents
indicated that their attitudes and initiatives were moving in “Internet usage
the right direction to combat infringed content:
• 100% indicated that their organization includes
continues to grow at a
commitments in their contracts not to purchase inventory rapid pace, and with it,
so does internet-based
on sites with infringed content.
• 99% said that their organization performs measures aimed
at excluding sites with infringed content in response to
reasonable and sufficiently detailed complaints from
infringement.”
copyright holders and advertisers. David Price, NetNames Director of Piracy
• 81% noted that their organization performs measures Analysis, “Sizing the piracy universe,” NetNames,
specifically aimed at removing or excluding sites with September 2013.
infringed content from platforms that use fraud or
deception to avoid the requirements set by the advertiser
or agency.
• 79% indicated that their organization’s leadership is against
advertisements being served to sites with infringed content.
• 79% said that they have witnessed their staff discussing
concerns regarding advertisements appearing on sites with
infringed content.
• 42% suggested that their organization has designated
an individual or role responsible for mitigating risk of ads
appearing on sites with infringed content.

15
Malvertising+
16
Malvertising+
threat landscape
Malvertising+ How an attacker
Delivery methods views the landscape
• Deceptive download: tricked into download
• Drive-by download: unintended software download Creating fraudulent content
1
(fraudulent ads, fraudulent agencies,
• Link hijacking: redirection to unintended site
drive-by download ads, deceptive
• Watering hole: targeted drive-by download download ads, bad scripts, spyware,
ransomware, scareware, viruses)
Uses and purpose
• Ad bot creation: uses infected machine for ad fraud
Altering good content (code injection,
• Nuisanceware: adds unwanted features 2
link hijacking, repository compromise)
• Ransomware: alters system until payment is made
• Scareware: scares user to pay for unneeded “fix”
• Spyware: collects consumer activity without consent Content mining (cookie hijacking,
3
• Virus/infection: has ability to use consumers’ device watering hole targeting)

Computer

Third parties 1 2 3

1 1 1 1 2 2 2
2 2 2 2 3 3
3
Advertiser Agency DSP Exchange SSP Network Publisher

Data aggregators 3

17
Comprehensive description The following are broad malware categories based on
delivery methods:
Malvertising+ (from “malicious advertising”) uses the digital
• Link hijacking results in an advertisement or script
advertising ecosystem to inject malware onto consumers’
automatically redirecting users to a website that they have
devices, where the digital advertising ecosystem includes ad
not decided to visit. These sites then often deliver malware
content (malvertising from malicious advertising). The “+”
to a consumer’s browser.
in the term malvertising+ refers to compromised third-party
scripts intended for measurement or related purposes. • A drive-by download advertisement or script leads users
Malvertising+ refers to the potential distribution of malware to unintentionally download software to their device
across a larger population of consumers by compromising without their knowledge.
a single advertisement or script than would be possible • A watering hole attack is similar to a drive-by download
through compromising a single website or content source. advertisement or script. However, it targets a specific
The sites themselves are generally not infected; instead, the audience, drawing users to a site where they have a shared
malware arrives through infected ad content or compromised interest or pattern of visitation that has been designed to,
third-party scripts delivered to the browser along with the or compromised to, deliver the malware to the consumer’s
website content. device.
In addition to malvertising+, other malware approaches • A deceptive download advertisement or script attempts to
include phishing emails, social media and content separated lure users to authorize a download without understanding
from any advertising. These are outside of the scope of the consequences. For example, a Trojan Horse can
this study. disguise itself as a legitimate program and provide remote
In the two categories that follow (based on delivery method access to carry out malicious activities (e.g., generate ad
and purpose), the lists pertain to all forms of malware, impressions, relay spam, steal data and monitor activity).
including malvertising+. In the first three categories, the user does not need to click
on the advertisement to be infected. The need to click on the
malware to become infected is a common misconception.

The following are broad malware categories based

The need to click on the on purpose:

malware to be infected is a • Spyware spies on the users’ activity (e.g., collecting


keystrokes and critical data such as financial and login)
common misconception of without their knowledge.

the public.
• Ransomware alters the user’s system (e.g., locking the user
out) and then displays a message demanding payment to
return the system to the previous state.
• Scareware is software that appears legitimate (e.g., tool to
fix the user’s PC). However, when it runs, it informs the user
(attempting to scare) of an issue and asks for payment in
return for fixing the issue.
• Nuisanceware adds unwanted or unintended features to a
user’s PC (e.g., toolbars, widgets, etc.).

18
Malvertising+
• A virus infects the user’s device and takes over part or all of or real-time bidding systems to further target consumers
its functions for malicious purposes (e.g., relay spam, harm with specific operating systems, browser versions, Flash
computers, steal data and monitor activity). versions, geographic locations, or IP addresses that may
indicate residential, university or corporate users, and
• Ad bot creation uses the infected machine as a bot for
potentially the institution or business the consumer is
impression and click fraud.
within; 5) launching attacks on weekends or holidays
The following are ways malvertising+ can be established: when it is likely ad operations personnel are away from
the office or will take longer to respond to malware
• Creating fake advertisers or advertising agencies that attacks; and 6) embedding malware in HTML headers, and
pretend to represent legitimate clients in a buy. steganographically embedding malicious code fragments
• Gaining access to a library of affiliate marketing ad in image and SWF files that are linked together to form an
creatives and hijacking them to deliver malware. attack string at run time.

• Compromising third-party scripts delivered with the ad or To fight back, some key preventive measures include:
page content that are intended for measurement or related
purposes. • Using ad-serving tools and controls that can scan the
creative to detect and disable injected or unintended code
• Attaching malware to a selected download that appears
(i.e., malware) before allowing ads to launch. This would
legitimate to the consumer.
entail scanning Flash or JavaScript files, either manually
For several of the methods listed above, nefarious malware or by using sites that provide malware scanning tools.
attackers use malware delivery kits (available for relatively Companies should run these analyses on systems outside of
inexpensive price via the web) and advertising to infect a their system to prevent infection of their internal systems
consumer’s device. and to prevent the identification of the environment as
a test environment in which the malware should remain
Malvertising+ is able to exist and prosper in an ecosystem hidden and dormant.
for many reasons, including:
• Evaluating business partners, including advertisers,
• Not prioritizing security within the creative quality agencies and third parties with whom companies work
assurance function, or having insufficient tools and (background checks, credit checks, etc.), to determine if
resources to fight it. they are reputable and legitimate companies.
• A single weak link in the digital advertising ecosystem that • Assessing third-party tech partners’ diligence regarding
can be compromised to inject malware. their evaluation of business partners, internal security
framework, and quality assurance over ad content and
• Traditional PC defenses like antivirus and other tools are
scripts received from partners.
unable to determine in time whether a compromised third-
party script or advertisement, such as a Flash-powered • Identifying and closing holes on sites or internal systems.
banner ad (which is not defined as malicious itself), is simply • Reporting business partners involved in the ad-serving
serving ad content or something more sinister. transaction that handle the ad content or provide third-
• Attackers who use tactics to slip past the filtering systems. party scripts in support of the transaction to the advertiser
This may include: 1) enabling the malicious trigger after a and agency.
delay of several days following the approval of the ad; 2) • Finding a way for the good actors in the industry to share
only serving the bad ad or script to every nth consumer; information to help reduce the level of malvertising+.
3) targeting to, or away from, specific consumers based on
identifier information such as IP address, operating system,
browser and other parameters; 4) leveraging programmatic

19
Cost impact to industry Cost to fight

We weighted and projected our voice of the industry data to


Direct incidents
calculate an annual estimated rounded cost of $17,000,000
When malvertising infects a publisher or ad system, there to hire third-party vendors to assist in monitoring ads served
are costs incurred to investigate, remediate and document for purposes of identifying malware. Forty-nine percent of the
the incident. For purposes of estimating the cost impact, we respondents indicated that their organization hired a third-
obtained data related to the number of malvertising incidents party vendor.
(92,527) for the first six months of 2015. These incidents
Blacklisting
were identified by a third-party digital security company that
monitors a significant number of publisher pages and apps on Due to the potential damage to the public, several search
a daily basis. We annualized the incident number (185,054) engines place any website found to have malware on a
and then applied a $50 and $500 cost per incident (based on blacklist. Potential visitors to these sites are warned that the
inquiry with the security company; this is the general range site may be unsafe. Alternatively, the site may be excluded
of the cost) to calculate a low-end and a high-end range. We from search results altogether. For legitimate website owners,
then divided the midpoint by 25% (approximate US coverage the blacklist has several significant consequences, including
monitored by the company) to estimate an overall rounded reputational impact, reduction in traffic referred by the search
cost impact. engine, downtime impacting revenue and direct costs to
Direct incidents handle the security incident.
According to a 2014 Carnegie Mellon University study
Dollar value conducted by the Software Engineering Institute, more than
Low end $9,252,700
30 million domain names were added to one of 18 different
internet blacklists — meaning approximately 4.5% observed
Midpoint $50,889,850 fully-qualified domains on the Internet were blacklisted
during 2014.19 The study also noted that only 3.84% of the
High end $92,527,000
blacklisted domains were on multiple lists. This is largely
Overall rounded cost of impact $204,000,000 because of a lack of common terminology among the list
providers and a lack of information on the algorithms used.
The security company also noted a 260% increase in the As such, it is difficult to evaluate the efficacy of the lists.
levels of malvertising during the first six months of 2015
based on the companies they monitor. During the same time
frame, fake Flash updates have replaced fake antivirus and
fake Java updates as the most commonly used method to lure
consumers into installing malware.

19. Leigh Metcalf and Jonathan Spring, “Blacklist Ecosystem Analysis Update: 2014,” Carnegie Mellon University/Software Engineering Institute,
http://resources.sei.cmu.edu/asset_files/WhitePaper/2015_019_001_428614.pdf), accessed November 2015.

20
Malvertising+
As it relates to blacklisting, our voice of the industry For purposes of estimating the cost impact of blacklisting, our
study noted the following: study was interested in legitimate websites whose businesses
were impacted by a malware security incident. During 2014,
As it relates to the cost impact of a US-based nonprofit anti-malware organization received

13% blacklisting to their organization,


for the 13% of the companies
in the study who indicated that
29,000 requests from websites (the direct request increases
the likelihood that these represented legitimate sites)
impacted by blacklisting requesting the organization to review
of the companies in their organization had been the website and delist the site from these blacklists. The vast
the study indicated subject to blacklisting by a search majority was cleaned within two days without assistance,
that their organization engine or other organization: which could represent cleanup or the malware only existed
had been subject for a short period of time; however, approximately 2,000
to blacklisting by
a search engine or 6% indicated the cost
was under $200,000
requested a manual inspection by the organization, which is a
strong indicator that they were not free of malware. To assign
other organization.
7% indicated the cost
range was $200,000
a cost related to blacklisting, we considered that the majority
of these sites represented small businesses (further supported
to $499,999 by our voice of the industry study, where only 13% of the IAB
members had been impacted), and according to the IDC, the
average annual revenue of a small business with a website,
when adjusted for inflation, is $6.35 million or $17,386 per
day.20 We conservatively selected a 50% negative impact or
$8,693 per day for blacklisting over an average of two days
“Visits to mainstream (this period was used because most incidents were addressed

websites can expose


within two days; however, some took longer), which results
in an estimated cost of $504,194,000 related to the total

consumers to hundreds impact of malware blacklisting. Because the organization


estimated 10% or less of the cases were due to malvertising,

of unknown or potentially we calculated a range impact of zero to $50,419,400 with a


midpoint of $25,209,700 (used in our estimate below to
dangerous third parties.” be conservative).
We also weighted and projected our voice of the industry
“Online Advertising and Hidden Hazards to data to calculate the impact to the larger organizations within
Consumer Security and Data Privacy,” Permanent the digital advertising ecosystem and estimated a cost of
Subcommittee on Investigations Majority and $31,325,000. As a result, the total rounded cost impact is
Minority Staff Report, United States Senate, 15 estimated at $57,000,000.
May 2014, https://www.hsgac.senate.gov/media/
permanent-subcommittee-on-investigations-
releases-report-online-advertising-and-hidden-
hazards-to-consumer-security-and-data-privacy-
accessed November 2015.

20. Small Business at a Glance, Entrepreneur.com, http://www.entrepreneur.com/page/216022, accessed September 2015; EY analysis.

21
Blacklisting Ad blocking related to malvertising+

Dollar value Malvertising+ may also result in consumers using a higher


number of ad-blocking mechanisms. For this part of our study,
Low end $0
we did not consider ad technology companies that make
Midpoint $25,209,700 money using threats with publishers.

High end $50,419,400 In a 2014 study performed by PageFair and Adobe,


approximately 17% of respondents cited privacy concerns
Impact to larger organizations within $31,325,000 as the reason for using ad blocking.21 Ad blocking typically
the digital advertising ecosystem
removes most forms of advertising from websites, including
Overall rounded cost of impact $57,000,000 banner ads, text ads, sponsored stores and video pre-roll
ads. Typically, users can install it in seconds as a browser
extension available on most popular browsers. This action
has the potential to impact publisher inventory levels (e.g.,

“… blacklisting is not a less revenue to publishers and associated tech companies).


It can also inhibit brands from reaching certain target
sufficient defense; an demographics. For example, 54% of males surveyed between
the ages of 18 and 29 indicate that they use ad-blocking
organization needs other software. The study also identified the Chrome and Firefox
browsers as those most used among the ad blockers. The
defensive measures to remaining browsers were all under 3%. PageFair noted that

add depth, such as gray


ad blocking is available on all desktop web browsers, but it
is exceptionally popular on browsers that require end-user

listing, behavior analysis, installation, such as Chrome, Firefox and Opera. Conversely,
ad blocking is very low on pre-installed browsers like Internet

criminal penalties, speed Explorer and Safari.


According to direct estimates provided by PageFair to EY, there
bumps, and organization- were approximately 40 million monthly active ad-block users

specific white lists.”


within the US as of June 2015 or 15% of the total US online
population. Analyzing this at a publisher level, PageFair noted
that there is a wide range in the amount of ad blocking with
Leigh Metcalf & Jonathan Spring, “Blacklist some websites (range was 1.5% to 65% of the ads blocked).
Ecosystem Analysis Update: 2014,” Carnegie
Mellon University/Software Engineering Institute.

21. Adblocking goes mainstream, PageFair, http://downloads.pagefair.com/reports/adblocking_goes_mainstream_2014_report.pdf, accessed November 2015.

22
Malvertising+
As it relates to ad blocking, our voice of the industry For purposes of estimating the cost impact of ad blocking
study noted the following: related to malvertising+, we calculated an estimated cost
of $781,000,000 as follows:

• Ad revenue generated per person not blocking

49%
of the companies in the study indicated that
they measure the level of ad blocking at their was $209.09 based on 2014 digital ad spend
websites or via their platforms for the ad of $49.5 billion divided by 236,739,760
technology companies. (279,834,232 US digital population multiplied by
84.6% of the US internet population estimated to
be not blocking ads).22
• Missed ad revenue was estimated at $9,025,447,009
For those measuring the ad blocking based on $209.09 multiplied by 43,165,369 ad blockers

87% 2% 11%
(279,834,232 multiplied by 15.4% of the US population
estimated to be ad blocking).
indicated the indicated the indicated the • As 17% of the PageFair respondents attributed the reason
level was less level was level was 20% for ad blocking to privacy (directly related to security and
than 10% 10% to 20% or greater malware), we calculated an estimate of $1,534,325,991.
• We also weighted and projected our voice of the
industry data to estimate an overall ad-blocking cost of
As it relates
to the cost 72% 8% $157,675,000 and then applied the 17% factor from the
PageFair study to estimate a cost of $26,804,750 (ad
impact of indicated the indicated a range
blocking associated with malvertising+).
ad blocking cost was under of $200,000 to
$200,000 $499,000 • The $781,000,000 estimated rounded cost was based on
to their
the midpoint between $26,804,750 and $1,534,325,991.
organization

12% 8%
“Ad blocking is beginning to
indicated a range indicated a range
of $500,000 to of $1,000,000
$999,000 or more
have a material impact on
publisher revenues.”
Mike Zaneis, CEO Trustworthy Accountability Group,
“Publishers and adblockers are in a battle for online
advertising,” FT.com, 29 March 2015, http://www.
ft.com/intl/cms/s/2/c84a647e-d3af-11e4-99bd-
00144feab7de.html#axzz3rmaUjreu, accessed
November 2015.

22. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.

23
Attitudes from publishers and ad tech organizations

Based on our voice of the industry study, combined publisher


and ad tech responses related to malware indicated an “… the attacks that are
opportunity for a stronger control framework as:
• 77% indicated that their organization had a process for
documented publicly
vetting the upstream and downstream partners in their are only the tip of the
iceberg. There are some
supply chain.
• 63% indicated that for the malvertising found on their
platform within the last year, the source of detection was
outside the company (i.e., client, third-party QC vendor or
campaigns that are so
ad tech). advanced that no one will
• 62% indicated the tone from the top of their organization
related to malvertising was strong or very strong.
ever see or hear about
• 59% indicated that their organization’s skepticism related to them.”
combating malvertising was high or very high.
Jerome Segura, “Large Malvertising Campaign
• 49% of the companies indicated having hired a third-party
Goes (Almost) Undetected,” Malwarebytes
company to assist their organization in the monitoring of
Unpacked, 14 September 2015, https://blog.
malvertising.
malwarebytes.org/malvertising-2/2015/09/large-
• 46% indicated the involvement of a security department malvertising-campaign-goes-almost-undetected/,
related to the proactive controls for identifying accessed November 2015.
malvertising.
• 43% indicated that they considered malware when
performing organizational risk assessments.
• 34% indicated malvertising was not investigated because
it was not a priority for the company or the company had
insufficient tools or resources to do so.
• 22% indicated they maintained metrics based on malware
investigations.
• 18% indicated their organization used ad hoc approaches to
addressing malware.
• 7% indicated that they had a cybersecurity insurance policy
that included a section on malware.
• 7% indicated that they required a SOC (Service Organization
Control) report covering security and integrity for the
upstream and downstream partners in the supply chain that
includes a section on malware.

24
Malvertising+

25
Invalid
traffic
26
Invalid traffic
landscape
Ad traffic is typically designed to deliver the right ad
at the right time to the right user. Fraudulent invalid
traffic generates ad-related actions to extract the
maximum amount of money from the digital advertising
Invalid traffic can enter ecosystem, regardless of the presence of an audience.
Legitimate invalid traffic generates actions in the
the ecosystem in several normal course of internet maintenance by non-human
ways, and for several actors: search engine spiders, brand safety bots and
purposes, including: competitive intelligence gathering tools.

Audience Traffic Cookie Click Illegitimate


extension sourcing enrichment fraud websites
Audience extension Traffic sourcing This approach Click fraud generates Illegitimate ad-
increases inventory increases inventory generates invalid invalid click activity to supported websites
by selling the through payments to activity on valid and illegitimately increase generate ad
inventory of third third parties to drive reputable sites to cost-per-click (CPC) impressions using
parties as if it traffic to the site, build a cookie profile revenue earned invalid traffic to
belongs to the site, which may ultimately of increased value (network click fraud) collect revenues
incentivizing the include a downstream within targeted buying or drive competitor from advertisers.
content partner partner sending systems, and then marketing costs
to increase traffic invalid traffic. visits fake websites to (competitor click
(and thereby achieve higher CPMs fraud), which is more
revenue), which may for the ads delivered commonly present
ultimately include a to the site. within the search-
downstream partner based advertising
sending invalid ecosystem.
traffic.

The above methods affect searches, displays, videos, audio, mobile (web and
in-application) and social.

27
Comprehensive description IVT does not in any way represent legitimate traffic. As such,
it is difficult to identify and prevent its monetization. Current
Invalid traffic (IVT) induces systems to generate ad-related studies vary widely in dimensioning the true impact of IVT.
actions for purposes other than support of the delivery of However, the general consensus is that IVT has a material
the right ad at the right time to the right user. This includes cost impact. Impacts may include: depressed inventory CPMs
actions occurring across the ecosystem, which impact the and a reluctance to invest and allocate digital media spend;
search, display, video, mobile, audio and social areas. IVT damaged reputation to organizations susceptible to exposure
may take the form of legitimate activity, as well as activity to fraudulent IVT; and the overall cost to fight.
generated by bad actors for fraudulent purposes. With the rise of automation and ever-increasing complexity
• Fraudulent IVT activity typically extracts the maximum of the digital supply chain, the prevalence of IVT is expected
amount of money from the digital advertising ecosystem, to persist. Fraudulent IVT in this environment is exacerbated
regardless of the presence of an audience. in ad transactions involving unknown sources, such as
publishers purchasing low-cost traffic or open ad exchanges.
• Legitimate IVT tends to generate actions during the normal
course of internet maintenance by non-human actors, In general, IVT has the potential to have a direct monetary
including actions executed by search engine spiders, brand impact to buy-side organizations. Fraudulent IVT’s impact may
safety bots and competitive intelligence gathering tools. be the result of fraudulent publisher sites selling inventory
to advertisers against known robotic traffic directed to the
The Media Rating Council (MRC) further defines IVT in terms
inventory. Alternatively, bad actors may operate fraudulent
of the methods by which IVT may be detected:23
publisher sites in addition to perpetrating illegitimate cookie
• General IVT is traffic identified through routine means of enrichment. Through cookies, bots are directed toward
filtration. Key examples include data center traffic; bots reputable sites to build cookie profiles that mimic traits of
and spiders or other crawlers masquerading as legitimate desirable consumers for ad targeting. The bad actor then
users; non-browser user-agent headers; hidden/stacked/ sells inventory on the fraudulent site against these enriched
covered or otherwise never-viewable ad serving, pre-fetch cookies at a higher CPM. In the latter scenario, the publisher’s
or browser pre-rendering traffic; and invalid proxy traffic. reputation may be impacted as the intermediate steps of the
• Sophisticated IVT is more difficult to detect and requires cookie enrichment process involve the presence of IVT across
advanced analytics, multipoint corroboration/coordination premium or otherwise reputable publisher content sites.
or significant human intervention, etc., to analyze
and identify. Key examples include: hijacked devices,
hijacked tags, adware, malware, incentivized browsing, “The digital advertising
industry must stop
misappropriated content (if applicable), falsified viewable
impression decisions and cookie stuffing.

having unprotected sex.”


Randall Rothenberg, CEO Interactive Advertising
Bureau, “IAB Head: ‘The Digital Advertising
Industry Must Stop Having Unprotected Sex’”
Businessinsider.com, http://www.businessinsider.
com/iab-randall-rothenberg-supply-chain-2014-2,
accessed November 2015.

23. Invalid Traffic Detection and Filtration Guidelines Addendum, Draft Version 5.0 — Public Comment Version, Media Rating Council, June 30, 2015.

28
Invalid traffic
Actions taken by publishers to maximize ad revenue may also A similar example regarding publisher-driven (potentially)
inadvertently (if not blatantly) support and encourage the fraudulent IVT relates to the practice of audience extension.
proliferation of fraudulent IVT within the digital supply chain. In these situations, a publisher may represent to sell inventory
Although sell-side organizations may not be immediately under the publisher’s ownership, but ultimately fulfill the ad
monetarily impacted by fraudulent IVT, the reputational buy through inventory placed on other sites owned by the
repercussion may ultimately result in a shift in ad spend publisher, affiliate sites or third parties. Although many of
away from publishers with practices that may facilitate these transactions are conducted through legitimate means
fraudulent IVT. One such example includes traffic sourcing, when the site placement of the sold inventory is transparent
whereby publishers sell more inventory than currently to the advertiser, lack of transparency in these transactions
available. They subsequently seek out third-party publishers may lead to the serving of ads outside of the audience target
to purchase additional traffic to drive the audience toward of the media plan.
sold inventory to fulfill the ad buy. In these situations, the
third party may likewise seek additional third parties to
fulfill the audience demands of the first-party publisher. In
these situations, third-party sources may resort to using bot
traffic to generate the necessary volume to meet inventory
demands. The initial intent of the first-party publisher
may not have been to perpetrate fraud in these situations.
However, the environment of the ad buy transaction and
third-party relationships increases the difficulty of maintaining
transparency and accountability related to the quality of the
audience fulfilling the ad buy.

29
Types of IVT
The following are additional examples of the specific sources of IVT present within the digital supply chain.

Impression/click/search impact (CPM, CPV and CPC impact)


Non-human or illegitimate traffic sources
Hijacked device A user’s device (browser, phone, app or other system) is modified to request HTML or make ad
requests that are not under the control of a user and made without the user’s consent.
Crawler masquerading A browser, server or app makes page-load requests automatically without declaring itself as
as a legitimate user a robot. Instead, the robot declares itself as a valid regular browser or app user agent where
there is no real human user. In addition, robots can be programmed to mimic human behavior
to develop a highly desirable profile that will incentivize a targeted ad campaign to serve an ad
to that robot.
Data-center traffic Traffic originates from servers in data centers, rather than residential or corporate networks,
where the ad is not rendered in a user’s device (there is no real human user).
Adware traffic/ A device where a user is present and additional HTML or ad requests are made by the adware
ad injection independently of the content being requested by the user. Adware may also contain a function
to inject an ad from the software onto a webpage as the user browses, rather than the ad being
delivered by the publisher of the webpage.
Proxy traffic Traffic is routed through an intermediary proxy device or network where the ad is rendered in a
user’s device where there is a real human user.
Non-browser A device declares a user-agent header not normally associated with human activity.
user-agent header
Browser A device makes HMTL or ad requests ahead of specific human-initiated navigation to the
pre-rendering requested resources, for example, the process by which the Safari browser creates thumbnails
for its new tab page.

Tag hijacking
Ad tag hijacking Ad tags are taken from a publisher’s site and onto another site without the publisher’s knowledge.
Creative hijacking Creative tags are taken from a legitimately served ad so they can be rendered at a later time,
without the consent of the advertiser or the contracted service provider.

Site/ad/audience attributes
Auto-refresh A page or ad unit may be enabled to request a new rendered asset more than once and at
periodic intervals.
Incentivized browsing A human user may be offered payment or benefits to view or interact with ads.
Hidden ads Ads are placed in such a manner that they cannot ever be viewable (e.g., stacked ads, ads
clipped by iframes, zero opacity ads).
Misappropriated content Sites may contain copyrighted content or links to copyrighted content without the rights to
monetize such content.
Illegitimate sites Websites are built primarily to collect advertising revenue and offer little to no content to
human audiences. These sites are often part of a network where each individual site collects a
small amount of revenue to avoid suspicion.
Falsely represented/ HTML or ad requests attempt to represent another site or device or other attribute, other than
domain spoofing/ the actual placement. Additionally, a publisher’s content management system (CMS) may be
laundered impressions compromised when a fake page is created using a legitimate publisher’s domain and markup
code.

Affiliate/lead/conversion impact (CPA and CPL impact)


Ad creative/other:
Cookie stuffing A client is provided with cookies from other domains as if the user had visited those.

30
Invalid traffic
Current response to address IVT The addendum also calls for organizations to maintain
a business partner qualification process. The goal is to
In response to IVT, industry participants have historically determine that upstream and downstream partners are
focused on standardization and developing technology that legitimate entities, and that they themselves have similar
can help identify IVT within the ecosystem. processes to vet partners, and identify and remove invalid
traffic from the transactions.
Industry standards
In addition to industry standards serving as guidelines to
Within the current digital supply chain ecosystem, commonly participants within the digital supply chain to detect and
accepted practices to address the presence of IVT include address IVT, all supply chain participants (publishers, ad
adherence to filtration guidelines established by the industry. exchanges, agencies) have a shared responsibility in this
The MRC is expected to formally release the Invalid Traffic effort. Agencies should be aware of the legitimacy of the
Detection and Filtration Guidelines Addendum in October publishers to whom ads are being served and scale reparation
2015. The addendum establishes minimum requirements when impressions are identified as the result of IVT.
to identify and remove invalid traffic from advertising Publishers should be aware of the risks posed to the value of
transactions. their inventory and avoid practices that may incent IVT. Ad
Specifically, the addendum establishes two categories of exchanges should work to detect and avoid, including IVT
invalid traffic. The first, “General Invalid Traffic,” consists of within sales transactions.
traffic identified through routine means of filtration executed Third-party vendors
through application of lists or with other standardized
parameter checks. Key examples include: known data-center To support transparency and accountability, and the need of
traffic, bots and spiders or other crawlers masquerading as buy-side organizations for additional intelligence regarding
legitimate users; activity-based filtration using campaign or the activities of participants within the digital supply
application data and transaction parameters from campaign chain, third-party vendors have developed and marketed
or application data; non-browser user-agent headers or other verification and fraud detection technologies. These
forms of unknown browsers; and pre-fetch or browser pre- technologies can validate ad delivery according to media
rendered traffic. plan, whether the ad content was ultimately viewable within
a user’s browser, and in certain cases support the detection
The second category, “Sophisticated Invalid Traffic,” consists
of fraudulent activity. Through the availability of this data,
of more difficult to detect situations that require advanced
participants within the digital supply chain gain additional
analytics, multipoint corroboration/coordination or significant
tools and resources to police the ecosystem and spotlight
human intervention, etc., to analyze and identify. Key
the presence of IVT beyond what limited capabilities may
examples include: hijacked devices; hijacked sessions within
have been available to services adhering to industry-
hijacked devices; hijacked ad tags; hijacked creative; hidden/
standard filtration methodologies.
stacked/covered or otherwise intentionally obfuscated ad
serving; invalid proxy traffic; adware; malware; incentivized Verification and fraud services in particular allow advertisers
manipulation of measurements; misappropriated content; to measure the risk relating to the placement of inventory
falsified viewable impression decisions; falsely represented to which ads are ultimately delivered. Such services identify
sites or impressions; cookie stuffing, recycling or harvesting; the nature of the environments in which the advertisements
manipulation or falsification of location data or related are served. Using the information, verification services
attributes; and differentiating human and IVT traffic when can typically confirm whether the ad was delivered on plan
originating from the same or similar source in certain closely (i.e., delivered to the sites, devices, geographies or target
intermingled circumstances. audience), whether the environment of the publisher site may
impact the prominence of the advertising (i.e., ad clutter,
presence of competitor ads) or whether the content of the

31
publisher page may damage the reputation of the advertiser
(i.e., brand safety). In certain cases, verification services
Evolving efforts to further reduce
allow for the blocking of ad content, in addition to reporting the impacts of IVT
situations in which ad serving is attempted to inventory that is
less desirable to the advertiser. As standardization and IVT detection technology continue to
evolve, the shift in focus to minimize the impact of IVT has
Fraud services, in contrast, place additional focus on the been toward fostering industry-wide participation in practices
inspection and review of data through proprietary means to that use transparency and accountability to establish an
unveil fraudulent traffic masquerading as legitimate traffic. increased level of trust within the buying and selling of
Using verification and fraud detection service providers allows online advertising. These initiatives vary from macro-focused
advertisers the additional opportunity to identify participants efforts, such as setting standards related to the methods
in fraudulent IVT practices and seek make-goods for IVT in which buyers and sellers transact business, to micro-
through the remediation process executed by advertisers (or focused efforts, such as individual business practices within
verification and fraud services on behalf of the advertiser) organizations to foster an environment focused on identifying
with publishers or middleware providers. and addressing IVT.
Similar to verification services, viewability services provide
additional data to advertisers regarding the quality of the Trustworthy Accountability Group
ad delivery in terms of whether the user requesting the ad
Through a cross-industry joint initiative, the IAB, the 4A’s and
content had an opportunity to see the content based on the
ANA formed TAG to combat malware, fight internet piracy,
ad placement within the browser’s viewport. As advertisers
eliminate fraudulent traffic and promote transparency.
shift toward using viewable impressions as the currency
metric during the ad buy, the ability to monetize IVT is further As it relates specifically to IVT and ad fraud, TAG has
minimized (since ad content is not typically rendered viewable developed an Anti-Fraud Working Group with a mission to
within a browser). improve trust, transparency and accountability by developing
tools, standards and technologies to eliminate fraud.
TAG is working to combat the negative impact of fraudulent
traffic in several ways.
• TAG recently announced plans to create, maintain and
“Invalid traffic is posing share the TAG Fraud Threat List. The list is actually a
database of domains that have been identified as known
a serious threat to sources of fraudulent bot traffic for digital ads. The initial
pilot phase of the program is already underway, with
marketplace confidence in several major advertising platforms participating. Broader

a healthy and vibrant digital deployment of the final program is expected in the third
quarter of 2015. TAG has joined with several leading ad
advertising ecosystem.” platforms in an effort to block illegitimate and non-human
ad traffic originating from data centers. In launching the
George Ivie, CEO “Media Rating Council Issues Invalid pilot program, TAG will initially use a large ad server’s
Traffic Detection and Filtration Guidelines for Public database of data center IP addresses and enhance it based
Comment Period,” PR Newswire, 1 July 2015. upon broader industry intelligence.

32
Invalid traffic
Long-tail publisher sites had a higher concentration of
IVT, in comparison to premium and highly trafficked
publisher sites.

• TAG will develop and enhance anti-fraud standards and


protocols for all types of entities in the supply chain.
Cost impact of IVT
• TAG will develop tools both to identify fraudulent activity, Cost from fraudulent traffic
and to better identify reputable companies in the supply
To estimate the cost from fraudulent traffic, we used ad
chain that are not associated with fraudulent conduct.24
revenue data published within the IAB Internet Advertising
Media Rating Council initiatives Revenue report.25 This helps us to define the size of US
ad revenue generated across display, video and search ad
The MRC has also coordinated with industry participants and formats delivered to desktop web and mobile platforms. To
trade organizations to modernize and strengthen existing triangulate the impact of IVT on the digital ad ecosystem, we
industry standards to filter and disclose IVT for measurement obtained multi-dimensional quantitative data representative
purposes. The main tenets included within this effort focus of impressions transacted across each vendor’s platform
not only on the modernization of existing guidelines to reflect thoroughout 2015 from representative third-party
the current online environment, but also on the standards to measurement analytics organizations and ad serving/
require processes to assess new IVT risks as they develop. exchange vendors. After evaluating the data provided and
Tenets will also consider the processes needed within adjusting for bias associated with the digital supply chain
organizations to understand and address the risks that other universe represented by each vendor data provider, we
participants within the digital supply chain may introduce into leveraged public research published by various IVT, fraud and
the ad transaction. Lastly, the MRC’s goals as they relate to analytics vendors as part of our study of studies research to
this effort focus on reducing discrepancies that result from develop a holistic estimation of IVT.
using myriad filtration methodologies across organizations
and requiring responsible disclosure of the filtration
methodologies an organization uses.

24. Eliminate Fraudulent Traffic, Trustworthy Accountability Group, https://www.tagtoday.net/traffic/, accessed November 2015.
25. IAB internet advertising revenue report: 2014 full year results — April 2015, IAB, http://www.iab.com/wp-content/uploads/2015/05/IAB_Internet_Advertising_
Revenue_FY_2014.pdf, accessed November 2015.

33
Our analysis provided the following estimated percentage (invalid traffic rate applied to the 2014 revenue) and cost impact of IVT
across pricing models and ad formats delivered to desktop and mobile platforms:

Desktop Mobile Total


Percentage Revenue Percentage Revenue Percentage Revenue
CPM-based: display 6.6% $500,000,000 9.8% $350,000,000 7.6% $850,000,000
CPM-based: video 11.1% $310,000,000 12.1% $160,000,000 11.4% $470,000,000
Performance-based 10.0% $2,340,000,000 10.0% $740,000,000 10.0% $3,080,000,000
Total estimated IVT cost 9.3% $3,150,000,000 10.2% $1,250,000,000 9.6% $4,400,000,000

34
Invalid traffic
Cost to fight Within the production impression data analyzed across our
vendor participants, our research identified trends regarding
We weighted and projected our voice of the industry data to the concentration of IVT consistent with many recent industry
calculate the internal cost to fight impact for organizations studies. These trends include:
within the digital advertising ecosystem and estimated a
• The inventory represented within our analyses primarily
rounded cost of $169,000,000. This cost was based on an
consisted of display content (>95% of impressions
average of 91 hours per week spent identifying, processing
analyzed). However, we noted that video ad impressions
and analyzing invalid traffic. To project to a full year, we used
contained higher concentrations of IVT in comparison to
a fully loaded wage hourly rate of $62 for supervisory-level
display impressions (11.4% in video versus 7.6% in display).
IT security practitioners in US-based organizations derived
from Ponemon Institute’s 2014 IT security spending tracking • IVT continues to increase in prevalence within the mobile
study.26 There are also several third-party vendors that are ad ecosystem. The cost impact of IVT in mobile may
available for hire to assist in identifying and eliminating invalid continue to rise, although the levels of IVT within mobile
traffic for advertisers. EY was unable to estimate a cost for advertising inventory may decline slightly as the levels of
this initial study but will attempt to estimate a cost in any human traffic rise.
future studies. • The inventory represented within our analyses primarily
EY summary: Through our study, we identified the estimated consisted of ad network and ad-exchange-traded inventory
cost impact of IVT on the digital advertising supply chain to (>75% of impressions analyzed). When assessed at a
be $4,600,000,000. This includes the costs from fraudulent domain or sub-domain level, rates of detected IVT tended
traffic ($4,400,000,000) and costs to fight associated with to cluster at either the low or high end of the continuum.
identifying and addressing IVT ($169,000,000). That is, there were a number of domains and sub-domains
noted with relatively low rates of IVT, as well as a number of
The majority, if not all, participants in the ecosystem, are
domains and sub-domains noted with relatively high rates
aware that invalid traffic exists. These participants make
of IVT. Interestingly, there were relatively few domains and
decisions while considering these issues. If invalid traffic
sub-domains noted with moderate rates of detected IVT.
were to be significantly reduced or eliminated, the supply and
demand relationship would change. There would be both a • Within our analyses, we noted that IVTs were distributed
reduction of available inventory, and over time as confidence similarly across the ad network and ad-exchange-traded
on the buy side improved, an increase in demand for the inventory in comparison to direct publisher buys. As a
available inventory. While eliminating invalid traffic would reference point, however, we saw only a slight increase in
not likely produce immediate material increases in CPMs, the the prevalence of IVT as a percentage of ad network and
change in the supply and demand relationship would increase exchange-traded inventory, relative to direct publisher buys.
CPMs over time. • Long-tail publisher sites had a higher concentration of IVT
(greater than 4:1), in comparison to premium and highly
trafficked publisher sites.

26. The Cost of Malware Containment, Ponemon Institute, sponsored by Damballa, January 2015.

35
Attitudes from publishers and ad tech organizations

Based on our voice of the industry study, the combined


publisher and ad tech responses indicated strong support for
combating the issue:
• 99% of respondents indicated that invalid traffic should be
detected and excluded from reported/billed metrics.
• 77% indicated the tone from the top of their organization
related to invalid traffic was strong or very strong.
• 50% indicated that their organization’s skepticism related to
combating invalid traffic was high or very high.
Furthermore, the study results for the ad tech respondents
indicated that their attitudes and initiatives were moving in
the right direction to combat the issue:
• 82% of respondents indicated that they require
upstream partners to disclose all third-party sources.
• 67% indicated that they spent less than 50 hours,
11% spent 50 to 100 hours and 21% spent 100 to 500
hours identifying, processing and analyzing fraudulent
invalid traffic.
• 66% indicated that their organization considered invalid
traffic when performing organizational risk assessments.
• 59% indicated that they always or often include contractual
obligations requiring supply chain partners to maintain
processes to identify and address invalid traffic.
• 28% indicated sophisticated approaches, 49% indicated
general detection and 65% indicated ad hoc analytic
approaches in response to mitigate the impacts of
invalid traffic.

36
Invalid traffic

37
For more information, contact: EY | Assurance | Tax | Transactions | Advisory
About EY
Jackson Bazley EY is a global leader in assurance, tax, transaction and
Executive Director advisory services. The insights and quality services we
Ernst & Young LLP deliver help build trust and confidence in the capital markets
Media & Entertainment Advisory Services and in economies the world over. We develop outstanding
+1 813 425 3650 leaders who team to deliver on our promises to all of our
stakeholders. In so doing, we play a critical role in building a
[email protected]
better working world for our people, for our clients and for
our communities.
Nick Terlizzi
Partner EY refers to the global organization, and may refer to one or
Ernst & Young LLP more, of the member firms of Ernst & Young Global Limited,
each of which is a separate legal entity. Ernst & Young Global
Media & Entertainment Advisory Services
Limited, a UK company limited by guarantee, does not
+1 813 225 4854
provide services to clients. For more information about our
[email protected] organization, please visit ey.com.

Ernst & Young LLP is a client-serving member firm of


Ernst & Young Global Limited operating in the US.

© 2015 Ernst & Young LLP.


All Rights Reserved.

SCORE No. EA0104


1509-1644563 SE

ED None
This material has been prepared for general informational purposes
only and is not intended to be relied upon as accounting, tax or other
professional advice. Please refer to your advisors for specific advice.

www.ey.com

You might also like