HUMAN Launches Ad Click Defense: Protect Your Platform Revenue from Click Fraud
The Quadrillion Report: 2025 Cyberthreat Benchmarks
Announcing HUMAN Sightline: AI-powered Insights for Granular Bot Attack Visibility
Platform
Human Defense Platform
Platform Packages
Advertising
Applications
Account
Solutions
Features
Industries
Learn
Blog
HUMAN Insight and Research from our team
Resources
Interviews, research, whitepapers, videos, articles—all in one place
Case Studies
See what customers have to say about HUMAN
Documentation
Webinars
Security
Glossary
Company
About
Leadership
Satori Threat Intelligence Research Team
HUMAN’S Satori Threat Intelligence and Research Team proactively uncover and disrupt bot-driven threats
News
HUMAN in the News
Board of Directors
Meet the mind behind HUMAN’s mission
Careers
Find your next career move with HUMAN
The Human Collective
Collective protection to fight ad-based fraud
Partners
Technology Partners
HUMAN collaborates with the world’s leading technology companies
Partnerships and Integrations
HUMAN integrates with several technology partners, ensuring bot mitigation success in any environment.
Partner Portal
Log into the HUMAN Partner Portal for collateral, documentation, and other partnership needs.
Resellers
Explore HUMAN’s technology through channel partners, combining bot mitigation and other security solutions.
View Plans
Get a Demo
Derived from an ancient word meaning “comprehension, awakening, or understanding”. We took those roots of insight and embedded Satori threat intelligence throughout all of HUMAN’s products, curating a holistic approach that not only protects customers and partners but also publicly exposes malicious actors and their techniques thereby safeguarding the entire internet landscape.
1 million+
BADBOX 2.0 infected more than 1 million devices worldwide.
750 Million
At peak, BADBOX 2.0-infected devices accounted for 750 million fraudulent bid requests a day.
24
Decoy apps in major app marketplaces enabling fraud through off-market apps across the internet.
10 Million
10s of millions in monetary loss for businesses and customers. Dozens of store fronts all taken down by HUMAN partners.
1,000+
Over 1,000 web pages have been infected, driving traffic to fake web shops by injecting malicious payloads into legitimate websites.
200+
200+ fake web shops that abuse digital payment providers to steal consumers’ money and credit card information; 121 active during our investigation.
10 Billion
At peak, the malicious apps generated 10 BILLION fraudulent ad requests per day.
10 Decoy “Evil Twin” Apps
Satori researchers identified more than 250 app pairs abusing the CaramelAds advertising SDK across the internet.
700 url+
Researchers gained a broader understanding of the threat’s scope from a collection of IOCs, which included over 700 URLs, likely featuring compromised free content uploaded to platforms.
280,000
280,000 unique devices were impacted through ad fraud scheme.
74,000+
Over 74,000 off-brand Android devices showed signs of BADBOX infection.
227
The ad fraud botnet’s conglomerate of associated apps were found in 227 countries and territories.
12 Billion
12 billion fraudulent ad requests in one day.
11 Million
11 million devices running ads within apps.
1,700+
More than 1,700 apps were spoofed across platforms.
13M+
Associated apps were downloaded 13+ million times.
80+
80 Android apps on the Google Play Store and 9 apps on the Apple App Store were affected.
Full Takedown
was orchestrated in collaboration with Google and Apple.
300 Million
At its zenith, the Methbot operation was “watching” 300 million video ads a day. And as video advertising carries a significantly higher cost than traditional banner or social ads, this adds up fast.
6,000
More than 6,000 premium publishers were spoofed in this operation.
10
The ringleader of the Methbot scheme was recently sentenced to 10 years in prison and restitution fines of more than $3.5 million.
700,000
The 3ve botnet had more than 700,000 active infections at a time during its operation.
3 billion
More than 3 billion ad requests every day were attributable to the 3ve botnet.
20+
The industry group built to disrupt—and take down—the 3ve botnet and scheme was composed of more than 20 organizations, including Google, Facebook, Amazon, and the FBI.
28%
At its height, the ICEBUCKET scheme accounted for 28% of all connected TV traffic passing through the Human Verification Engine.
1.9 Billion
Nearly two billion pre-bid ad requests were associated with the ICEBUCKET operation every day before its disruption.
2 million
More than two million people in 30 countries were spoofed or faked during ICEBUCKET.
The PARETO operators spoofed more than 6,000 CTV apps as part of their scheme.
1 Million
PARETO operated chiefly through a botnet of nearly one million infected Android phones.
650 Million
Across its mobile and CTV-centric botnet, the PARETO operation made more than 650 million fraudulent bid requests a day.
Gavin Reid
CISO
Lindsay Kaye
Vice President of Threat Intelligence
Maor Elizen
Senior Threat Intelligence Investigator
João Santos
Senior Manager of Threat intelligence
João Marques
Senior Threat Researcher
Gabriel Cirlig
Principal Security Researcher
Vikas P
Staff Investigator & Research
Inna Vasilyeva
Senior Threat Intel Analyst and Reverse Engineer
Aviad Kaiserman
Senior Cyber Threat Intelligence Analyst