educational

IP Cloaking, Other Exploits Impact Website Traffic Flow

It’s not often discussed, especially by traffic brokers, but a significant percentage of adult website traffic is essentially worthless — comprised of “skimmed” traffic; a purely euphemistic expression for forcibly redirected surfers, who clicked on one thing and then received another — or is made up of artificially generated “hits.”

This traffic is shuffled site to site, vendor to vendor; each taking a bite at the apple, but with a prospect that is likely annoyed, distrusting and unwilling to offer up payment or personally-identifying information at a site he “mysteriously” arrived at.

The concept behind cloaking is simple: serve benign content to detection systems, but serve malicious content to normal web page visitors.

While advanced trade scripts and careful monitoring can help improve the traffic mix, fraudulent website operators are upping the ante by aggressively cloaking their domains — obfuscating traffic sources and opening the door to widespread malware distribution, among other threats to computer security — as well as committing ad network fraud.

One problem with all of this is that a bad user experience on one site may tarnish the reputation of the referring site. For example, clicking a thumb on your favorite TGP puts you into a redirect chain that leaves your computer infested with malware: would you return to the original TGP or find another? Sure, as the TGP owner, you may think that your site is on the up-and-up, but when linking to others, especially unknown entities, the results can never really be predicted.

Highlighting the problem is a recent report from Google detailing four years of data gathered from its Safe Browsing initiative, covering 160 million pages on 8 million sites.

“Each day we show around 3 million malware warnings to over four hundred million users whose browsers implement the Safe Browsing API,” Google’s Security Team says. “Like other service providers, we are engaged in an arms race with malware distributors.”

The report, entitled “Trends in Circumventing Web-Malware Detection,” reveals the depth of this technological arms race and is available as a downloadable PDF document (research.google.com/archive/papers/rajab-2011a.pdf).

Noted in the report is the trend of social engineering attacks. For example, using false malware warnings to encourage users to download and install an “anti-virus” tool, which actually contains the malware. More commonly used, however, are “drive by” exploits, which target vulnerabilities in the website visitor’s browser or plugins; but cloaking is a common denominator in many attacks.

“Malware distributors are increasingly relying upon ‘cloaking’ as a technique to evade detection,” the Security Team added. “The concept behind cloaking is simple: serve benign content to detection systems, but serve malicious content to normal web page visitors.”

Related:  

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Know When to Drop Domains You Don't Need

Do you own too many domains? If so, you’re not alone. Like other things we accumulate, every registered domain means something to us. Sometimes a domain represents a dream project we have always wanted to do but have never quite gotten around to.

Juicy Jay ·
opinion

Understanding 'Indemnification' in Business Contracts

Clients frequently tell me that they didn’t understand — or sometimes, even read — certain portions of a contract because those sections appeared to be just “standard legalese.” They are referring, of course, to the specialized language used in legal documents, including contracts.

Corey D. Silverstein ·
opinion

5 Steps to Make Card Brand Compliance Easy

It’s February, the month of love. Just once, wouldn’t it be great to receive a little candy heart asking you to “Be Mine” instead of more forms to fill out and documents to submit? Of course, regulatory compliance does have one important thing in common with romance: Fail to put in the work, and your relationship is likely over — your relationship with the card brands, that is.

Cathy Beardsley ·
opinion

Protecting Your Business With a Data Backup Strategy That Works

If the subject of backups sounds boring to you, maybe this will grab your attention: Without properly implemented backups, your business is vulnerable to partial or even catastrophic data loss, which could screw your company and tank your income.

Brad Mitchell ·
profile

WIA Profile: Paulita Pappel

Raised in Spain, surrounded by a predominantly Catholic community, Paulita Pappel grew up being told porn was bad. When she became a feminist, she was told her fascination with porn was not in line with her desire to empower women. This inner conflict made her feel like there was something wrong with her.

Women In Adult ·
opinion

Complying With New Age Assurance and Content Moderation Standards

For adult companies operating in today’s increasingly regulated digital landscape, maintaining compliance with card brand requirements is essential — not only to safeguard your operations but also to ensure a safe and transparent environment for users.

Gavin Worrall ·
opinion

Understanding the FTC's New 'Click to Cancel' Rule

The Federal Trade Commission’s new “Click to Cancel” rule has been a hot topic in consumer protection and business regulation. Part of a broader effort to streamline cancellation processes for subscription services, the rule has sparked significant debate and legal challenges.

Corey D. Silverstein ·
opinion

Key Factors for Choosing a Merchant Services Partner

Running a successful adult business requires more than just delivering alluring and cutting-edge products and services. Securing the right payment processing partner is essential to maintaining a steady revenue stream.

Jonathan Corona ·
opinion

Identifying and Preventing Transaction Laundering

Recently, a few merchants approached me after receiving compliance notifications from their acquirer about transaction laundering. They were unsure what it meant, and unsure how to identify and fix the problem.

Cathy Beardsley ·
profile

WIA: Alexis Fawx Levels Up as Multifaceted Entrepreneur

As more performers look to diversify, expanding their range of revenue streams and promotional vehicles, some are spreading their entrepreneurial wings to create new businesses — including Alexis Fawx.

Women In Adult ·
Show More