{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T22:09:18Z","timestamp":1768428558798,"version":"3.49.0"},"publisher-location":"Cham","reference-count":122,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031859595","type":"print"},{"value":"9783031859601","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-85960-1_17","type":"book-chapter","created":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T07:23:43Z","timestamp":1741245823000},"page":"405-436","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Partn\u00ebrka in\u00a0Crime: Characterizing Deceptive Affiliate Marketing Offers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2297-8328","authenticated-orcid":false,"given":"Victor","family":"Le Pochat","sequence":"first","affiliation":[]},{"given":"Cameron","family":"Ballard","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5155-7472","authenticated-orcid":false,"given":"Lieven","family":"Desmet","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7710-5092","authenticated-orcid":false,"given":"Wouter","family":"Joosen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7386-7260","authenticated-orcid":false,"given":"Damon","family":"McCoy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5779-0643","authenticated-orcid":false,"given":"Tobias","family":"Lauinger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,7]]},"reference":[{"key":"17_CR1","unstructured":"A Complete Overview of the Health & Beauty (Nutra) Vertical. Advidi (2017). https:\/\/advidi.com\/overview-health-beauty-nutra-vertical\/"},{"key":"17_CR2","unstructured":"A Complete Overview of the Mainstream Vertical. Advidi (2017). https:\/\/advidi.com\/complete-overview-mainstream-vertical\/"},{"key":"17_CR3","unstructured":"A Guide to the Finance Vertical. Advidi (2020). https:\/\/advidi.com\/a-guide-to-the-finance-vertical\/"},{"key":"17_CR4","unstructured":"Ad Creatives Review. Pushground Blog (2021). https:\/\/www.pushground.com\/blog\/ad-creatives-review"},{"key":"17_CR5","unstructured":"Add Your Network\/Program. Affplus. https:\/\/www.affplus.com\/add-network"},{"key":"17_CR6","unstructured":"Affiliate Marketer\u2019s Guide to Antivirus and VPNs. Pushground Blog (2021). https:\/\/www.pushground.com\/blog\/antivirus-advertising-guide"},{"key":"17_CR7","unstructured":"affilinc Ltd. AffiliateFix (2021). https:\/\/www.affiliatefix.com\/"},{"key":"17_CR8","unstructured":"affLIFT, LLC. affLIFT (2021). https:\/\/afflift.com"},{"key":"17_CR9","unstructured":"Aliapoulios, M., Ballard, C., Bhalerao, R., Lauinger, T., McCoy, D.: Swiped: analyzing ground-truth data of a marketplace for stolen debit and credit cards. In: USENIX Security, pp.\u00a04151\u20134168 (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/aliapoulios"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Alowaisheq, E., et al.: Cracking the wall of confinement: understanding and analyzing malicious domain take-downs. In: NDSS (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23243.","DOI":"10.14722\/ndss.2019.23243."},{"key":"17_CR11","unstructured":"Steven Baker, C.: Subscription traps and deceptive free trials scam millions with misleading ads and fake celebrity endorsements. Better Business Bureau (2018). https:\/\/www.bbb.org\/article\/investigations\/18929-subscription-traps-and-deceptive-free-trials-scam-millions-with-misleading-ads-and-fake-celebrity-endorsements"},{"key":"17_CR12","unstructured":"Ban Your Stereotypes about FB. AdCombo (2018). https:\/\/blog.adcombo.com\/ban-your-stereotypes-about-fb\/"},{"key":"17_CR13","unstructured":"BBB Scam Alert: Looking for Love? Don\u2019t Fall for a Fake Dating Website. Better Business Bureau (2021). https:\/\/www.bbb.org\/article\/news-releases\/24477-bbb-scam-alert-looking-love-dont-fall-for-a-fake-dating-service"},{"key":"17_CR14","unstructured":"Eric van den Berg. De verborgen industrie die Bitcoinadvertenties op Facebook zet: \u2018Ze weten niet eens dat we bestaan!\u2019. In: Brandpunt+ (2019). https:\/\/www.npo3.nl\/brandpuntplus\/de-verborgen-industrie-die-bitcoinadvertenties-op-facebook-zet-ze-weten-niet-eens-dat-we-bestaan"},{"key":"17_CR15","unstructured":"Magdalena Bober. The Ultimate Guide to Finding Profitable CPA Offers in Affiliate Marketing. Zeropark (2020). https:\/\/zeropark.com\/blog\/ultimate-guide-to-finding-profitable-cpa-offers\/"},{"key":"17_CR16","unstructured":"Caballero, J., Grier, C., Kreibich, C., Paxson, V.: Measuring pay-per-install: the commoditization of malware distribution. In: USENIX Security (2011)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Cable, J., Gray, I.W., McCoy , D.:Showing the receipts: understanding the modern ransomware ecosystem. In: eCrime (2024)","DOI":"10.1109\/eCrime66200.2024.00017"},{"key":"17_CR18","unstructured":"Clark, J.W., McCoy, D.: There are no free iPads: an analysis of survey scams as a business. In: 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats (2013)"},{"key":"17_CR19","unstructured":"Clayton, R., Moore, T., Christin, N.: Concentrating Correctly on Cybercrime Concentration. In: 14th Annual Workshop on Economics and Information Security (2015)"},{"key":"17_CR20","unstructured":"Cluley, G.: Beware! Free apple products used as lure in text scams. Naked Security (2012). https:\/\/nakedsecurity.sophos.com\/2012\/08\/08\/free-apple-products-text-scam\/"},{"key":"17_CR21","unstructured":"Commission Notice \u2013 Guidance on the Interpretation and Application of Directive 2005\/29\/EC of the European Parliament and of the Council concerning unfair business-to-consumer commercial practices in the internal market. In: Official Journal of the European Union C 526.2021\/C 526\/01, pp. 1\u2013129 (2021). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:52021XC1229(05)"},{"key":"17_CR22","unstructured":"Patrick, D.: How to find CPA offers: choosing the best CPA offer to promote. Adsterra (2021). https:\/\/adsterra.com\/blog\/how-to-find-the-best-cpa-offers\/"},{"key":"17_CR23","unstructured":"Dangu, J.: Fake Celebrity-Endorsed Bitcoin Scam Abuses Ad Tech to Net \\$1M in 1 Day. Confiant (2020). https:\/\/blog.confiant.com\/fake-celebrity-endorsed-scam-abuses-ad-tech-to-net-1m-in-one-day-ffe330258e3c"},{"key":"17_CR24","unstructured":"De Rosa, N., Yates, J., No\u00ebl, B.: Un empire montr \u00e9 alais de l\u2019arnaque en ligne. Radio-Canada.ca (2021). https:\/\/ici.radio-canada.ca\/recit-numerique\/2140\/adcenter-hyuna-philip-keezer-streaming-concours"},{"key":"17_CR25","series-title":"SpringerBriefs in Political Science","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-45312-5_3","volume-title":"Internationalization of Consumer Law","author":"HW Micklitz","year":"2017","unstructured":"Micklitz, H.W., Durovic, M.: International law on (un)fair commercial practices. In: Internationalization of Consumer Law. SPS, pp. 25\u201348. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-45312-5_3"},{"key":"17_CR26","unstructured":"Everything You Need To Know About High-Risk Industries. LegitScript (2023). https:\/\/www.legitscript.com\/fraud-risk-and-prevention\/high-risk-industries\/"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"Farooqi, S., Feal, \u00c1., Lauinger, T., McCoy, D., Shafiq, Z., Vallina-Rodriguez, N.: Understanding incentivized mobile app installs on google play store. In: IMC, pp.\u00a0696\u2013709 (2020). https:\/\/doi.org\/10.1145\/3419394.3423662","DOI":"10.1145\/3419394.3423662"},{"key":"17_CR28","unstructured":"Faux, Z.: They go out and find the morons for me. In: Bloomberg Businessweek, vol. 4564, pp. 56\u201361 (2018). ISSN 0007-7135"},{"key":"17_CR29","unstructured":"Federal Trade Commission. Affiliate Marketers to Pay More Than \\$4 Million to Settle Charges That They Promoted a Fraudulent Business Coaching and Investment Scheme (2020). https:\/\/www.ftc.gov\/news-events\/press-releases\/2020\/03\/affiliate-marketers-pay-more-4-million-settle-charges-they"},{"key":"17_CR30","unstructured":"Federal Trade Commission. Another Group of Marketers Behind Phony \u2018Gift Card\u2019 Text Spam Settles FTC Complaint (2014). https:\/\/www.ftc.gov\/news-events\/press-releases\/2014\/02\/another-group-marketers-behind-phony-gift-card-text-spam-settles"},{"key":"17_CR31","unstructured":"Federal Trade Commission. Enforcement Policy Statement on Deceptively Formatted Advertisements. Federal Register 81(74), 22596\u201322601 (2016). https:\/\/www.ftc.gov\/system\/files\/documents\/public_statements\/896923\/151222deceptiveenforcement.pdf"},{"key":"17_CR32","unstructured":"Federal Trade Commission. Fauxmats, False Claims, Phony Celebrity Endorsements, and Unauthorized Charges (2017). https:\/\/www.ftc.gov\/business-guidance\/blog\/2017\/11\/fauxmats-false-claims-phony-celebrity-endorsements-and-unauthorized-charges"},{"key":"17_CR33","unstructured":"Federal Trade Commission. Federal Court Rules Affiliate Marketing Network and Its Parent Company Must Turn Over \\$11.9 Million They Received From Deceptive Marketing Scheme (2015). https:\/\/www.ftc.gov\/news-events\/press-releases\/2015\/04\/federal-court-rules-affiliate-marketing-network-its-parent"},{"key":"17_CR34","unstructured":"Federal Trade Commission. FTC Announces Crackdown on Deceptively Marketed CBD Products (2020). https:\/\/www.ftc.gov\/news-events\/press-releases\/2020\/12\/ftc-announces-crackdown-deceptively-marketed-cbd-products"},{"key":"17_CR35","unstructured":"Federal Trade Commission. FTC Charges Marketers Used Massive Spam Campaign To Pitch Bogus Weight-Loss Products (2016). https:\/\/www.ftc.gov\/news-events\/press-releases\/2016\/06\/ftc-charges-marketers-used-massive-spam-campaign-pitch-bogus"},{"key":"17_CR36","unstructured":"Federal Trade Commission. FTC Charges Online Marketing Scheme with Deceiving Shoppers (2017). https:\/\/www.ftc.gov\/news-events\/press-releases\/2017\/08\/ftc-charges-online-marketing-scheme-deceiving-shoppers"},{"key":"17_CR37","unstructured":"Federal Trade Commission. FTC Seeks to Halt 10 Operators of Fake News Sites from Making Deceptive Claims About Acai Berry Weight Loss Products (2011). https:\/\/www.ftc.gov\/news-events\/press-releases\/2011\/04\/ftc-seeks-halt-10-operators-fake-news-sites-making-deceptive"},{"key":"17_CR38","unstructured":"Federal Trade Commission. FTC Settlement Bars Spam Email Marketing, Baseless Weight-Loss Claims by Diet-Pill Operation (2017). https:\/\/www.ftc.gov\/news-events\/press-releases\/2017\/03\/ftc-settlement-bars-spam-email-marketing-baseless-weight-loss"},{"key":"17_CR39","unstructured":"Federal Trade Commission. Geniux Dietary Supplement Sellers Barred from Unsupported Cognitive Improvement Claims (2019). https:\/\/www.ftc.gov\/news-events\/press-releases\/2019\/04\/geniux-dietary-supplement-sellers-barred-unsupported-cognitive"},{"key":"17_CR40","unstructured":"Federal Trade Commission. Internet Marketers of Dietary Supplement and Skincare Products Banned from Deceptive Advertising and Billing Practices (2017). https:\/\/www.ftc.gov\/news-events\/press-releases\/2017\/11\/internet-marketers-dietary-supplement-skincare-products-banned"},{"key":"17_CR41","unstructured":"Federal Trade Commission. Marketers Behind Fake News Sites Settle FTC Charges of Deceptive Advertising (2012). https:\/\/www.ftc.gov\/news-events\/press-releases\/2012\/11\/marketers-behind-fake-news-sites-settle-ftc-charges-deceptive"},{"key":"17_CR42","unstructured":"FTC Policy Statement on Deception (1984). https:\/\/www.ftc.gov\/system\/files\/documents\/public_statements\/410531\/831014deceptionstmt.pdf"},{"key":"17_CR43","doi-asserted-by":"crossref","unstructured":"Gao, H., Hu, J., Wilson, C.: Detecting and characterizing social spam campaigns. In: 10th Internet Measurement Conference (2010)","DOI":"10.1145\/1879141.1879147"},{"key":"17_CR44","unstructured":"Gawron, K.: Ranking of the Best Affiliate Marketing Niches for 2021. Zeropark Blog (2021). https:\/\/zeropark.com\/blog\/affiliate-marketing-best-niches-2021\/"},{"key":"17_CR45","unstructured":"Get Your Offers Listed on the Offer Engine. WOW TRK. https:\/\/www.wowtrk.com\/list-offers\/"},{"key":"17_CR46","unstructured":"Gray, S.: Lidl shoppers urged to watch out for \u00a3500 gift card scam - \u2018don\u2019t share personal details\u2019. Express.co.uk (2021). https:\/\/www.express.co.uk\/life-style\/life\/1438930\/lidl-uk-scam-warning-gift-cards-email-latest-news"},{"issue":"4","key":"17_CR47","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1080\/08911762.2020.1738002","volume":"33","author":"S Hamed","year":"2020","unstructured":"Hamed, S., El-Deeb, S.: Cash on delivery as a determinant of E-commerce growth in emerging markets. J. Glob. Mark. 33(4), 242\u2013265 (2020). https:\/\/doi.org\/10.1080\/08911762.2020.1738002","journal-title":"J. Glob. Mark."},{"key":"17_CR48","unstructured":"High-risk merchant accounts explained. Stripe (2024). https:\/\/stripe.com\/resources\/more\/high-risk-merchant-accounts-explained"},{"issue":"1","key":"17_CR49","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/14786011003634415","volume":"23","author":"TJ Holt","year":"2010","unstructured":"Holt, T.J., Lampke, E.: Exploring stolen data markets online: products and market forces. Crim. Just. Stud. 23(1), 33\u201350 (2010). https:\/\/doi.org\/10.1080\/14786011003634415","journal-title":"Crim. Just. Stud."},{"key":"17_CR50","unstructured":"Hooker, T.: Fact Check: Are Crypto Payouts Real?- PropellerAds Blog. PropellerAds Blog (2020). https:\/\/propellerads.com\/blog\/adv-fact-check-are-crypto-payouts-real\/"},{"key":"17_CR51","unstructured":"Hooker, T.: GEO master: understanding the different country tiers. ActiveRevenue (2020). https:\/\/activerevenue.com\/blog\/2020\/03\/26\/geo-master-understanding-the-different-country-tiers\/"},{"key":"17_CR52","unstructured":"How to Promote Affiliate Offers. Affise (2022). https:\/\/affise.com\/blog\/how-to-promote-affiliate-offers\/"},{"key":"17_CR53","doi-asserted-by":"publisher","unstructured":"Huang, D.Y., et al.: Tracking ransomware end-to-end. In: IEEE S &P, pp. 618\u2013631 (2018). https:\/\/doi.org\/10.1109\/SP.2018.00047","DOI":"10.1109\/SP.2018.00047"},{"key":"17_CR54","doi-asserted-by":"publisher","unstructured":"Huang, K., Siegel, M., Madnick, S.: Systematically understanding the cyber attack business: a survey. ACM Comput. Surv. 51(4) (2018). https:\/\/doi.org\/10.1145\/3199674","DOI":"10.1145\/3199674"},{"key":"17_CR55","doi-asserted-by":"publisher","unstructured":"Hutchings, A., Clayton, R., Anderson, R.: Taking down websites to prevent crime. eCrime, pp. 1\u201310 (2016). https:\/\/doi.org\/10.1109\/ECRIME.2016.7487947","DOI":"10.1109\/ECRIME.2016.7487947"},{"key":"17_CR56","unstructured":"Ivanov, A.V., Kuzin, M., Mogilin, I.: Shlayer Trojan Attacks One in Ten macOS Users. Securelist (2020). https:\/\/securelist.com\/shlayer-for-macos\/95724\/"},{"key":"17_CR57","unstructured":"Johnson, J.: Aldi Scam: Supermarket Shares Warning over \u00a3250 Voucher Scam Message. Express.co.uk (2020). https:\/\/www.express.co.uk\/life-style\/food\/1278219\/aldi-scam-message-voucher-coupon"},{"key":"17_CR58","unstructured":"Kanich, C., et al.: Show me the money: characterizing spam-advertised revenue. In: USENIX Security (2011)"},{"key":"17_CR59","doi-asserted-by":"publisher","unstructured":"Karami, M., Ghaemi, S., McCoy, D.: Folex: an analysis of an herbal and counterfeit luxury goods affiliate program. In: eCrime, pp. 1\u20139 (2013). https:\/\/doi.org\/10.1109\/eCRS.2013.6805782","DOI":"10.1109\/eCRS.2013.6805782"},{"key":"17_CR60","doi-asserted-by":"publisher","unstructured":"Karami, M., Park, Y., McCoy, D.: Stress testing the booters: understanding and undermining the business of DDoS services. In: 25th International Conference on World Wide Web, pp.\u00a01033\u20131043 (2016). https:\/\/doi.org\/10.1145\/2872427.2883004","DOI":"10.1145\/2872427.2883004"},{"key":"17_CR61","unstructured":"Kasprak, A.: Savage memes and lunar dreams: deceptive dating sites\u2019 intimate ties to firefly aerospace. In: Snopes.com (2020). https:\/\/www.snopes.com\/news\/2020\/02\/12\/savage-memes-lunar-dreams\/"},{"key":"17_CR62","unstructured":"Kesari, A., Hoofnagle, C., McCoy, D.: Deterring cybercrime: focus on intermediaries. Berkeley Technol. Law J. 32(3), 1093\u20131134 (2017). https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/berktech32%5C&i=1137"},{"key":"17_CR63","doi-asserted-by":"publisher","unstructured":"Koide, T., Chiba, D., Akiyama, M.: To get lost is to learn the way: automatically collecting multi-step social engineering attacks on the web. In: ASIACCS, pp. 394\u2013408 (2020). https:\/\/doi.org\/10.1145\/3320269.3384714","DOI":"10.1145\/3320269.3384714"},{"key":"17_CR64","unstructured":"Kotzias, P., Bilge, L., Antipolis, S., Caballero, J.: Measuring PUP prevalence and PUP distribution through pay-per-install services. In: USENIX Security (2016)"},{"key":"17_CR65","unstructured":"Krona, S.: D\u00e4rf\u00f6r f\u00e5ring;r du mystiska v\u00e4nf\u00f6rfr\u00e5gningar p\u00e5 sociala medier. In: SVT Nyheter (2020). https:\/\/www.svt.se\/nyheter\/darfor-far-du-mystiska-vanforfragningar-pa-sociala-medier"},{"key":"17_CR66","unstructured":"Kuku\u0142ka, M.:How to run affiliate marketing antivirus campaigns with push traffic? Zeropark Blog (2021). https:\/\/zeropark.com\/blog\/affiliate-marketing-antivirus-campaigns-push-traffic\/"},{"key":"17_CR67","unstructured":"Kuku\u0142ka, M.: Top Affiliate Offers in 2021. Zeropark Blog (2021). https:\/\/zeropark.com\/blog\/top-affiliate-offers-in-2021\/"},{"key":"17_CR68","unstructured":"van de Laarschot, J., van Wegberg, R.: Risky business? Investigating the security practices of vendors on an online anonymous market using ground-truth data. In: USENIX Security, pp.\u00a04079\u20134095 (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/van-de-laarschot"},{"key":"17_CR69","doi-asserted-by":"publisher","unstructured":"Le Pochat, V., et al.: A practical approach for taking down avalanche botnets under real-world constraints. In: NDSS (2020). https:\/\/doi.org\/10.14722\/ndss.2020.24161","DOI":"10.14722\/ndss.2020.24161"},{"key":"17_CR70","unstructured":"Lenihan, N.: Complete List of Country Tiers for Affiliate Marketing. affLIFT (2020). https:\/\/afflift.com\/f\/threads\/complete-list-of-country-tiers.3444\/"},{"key":"17_CR71","unstructured":"Leontiadis, N., Moore, T., Christin, N.: Measuring and analyzing search-redirection attacks in the illicit online prescription drug trade. In: USENIX Security (2011)"},{"key":"17_CR72","doi-asserted-by":"publisher","unstructured":"Levchenko, K., et al.: Click trajectories: end-to-end analysis of the spam value chain. In: S &P, pp. 431\u2013446 (2011). https:\/\/doi.org\/10.1109\/SP.2011.24","DOI":"10.1109\/SP.2011.24"},{"key":"17_CR73","unstructured":"Leveraging Facebook for Affiliate Marketing in 2020. Everad (2020). https:\/\/blog.everad.com\/en\/leveraging-facebook-for-affiliate-marketing-in-2020\/"},{"key":"17_CR74","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.drugpo.2016.05.006","volume":"35","author":"J Martin","year":"2016","unstructured":"Martin, J., Christin, N.: Ethics in cryptomarket research. Int. J. Drug Policy 35, 84\u201391 (2016). https:\/\/doi.org\/10.1016\/j.drugpo.2016.05.006","journal-title":"Int. J. Drug Policy"},{"key":"17_CR75","unstructured":"Marx, W.: A sunny place for a shady business. In: Bloomberg Businessweek, vol. 4724, pp. 42\u201347 (2021). ISSN 0007-7135"},{"key":"17_CR76","doi-asserted-by":"publisher","unstructured":"Mathur, A., et al.: Dark patterns at scale: findings from a crawl of 11K shopping websites. In: Proceedings of the ACM on Human-Computer Interaction, vol. 3, no. CSCW, pp. 81:1\u201381:32 (2019). https:\/\/doi.org\/10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"17_CR77","doi-asserted-by":"publisher","unstructured":"McCoy, D., Dharmdasani, H., Kreibich, C., Voelker, G.M., Savage, S.: Priceless: the role of payments in abuse-advertised goods. In: CCS, pp. 845\u2013856 (2012). https:\/\/doi.org\/10.1145\/2382196.2382285","DOI":"10.1145\/2382196.2382285"},{"key":"17_CR78","unstructured":"McCoy, D., et al.: PharmaLeaks: understanding the business of online pharmaceutical affiliate programs. In: 21st USENIX Security Symposium (2012)"},{"key":"17_CR79","unstructured":"Media Buying Campaign: How to Choose GEO? Udonis (2018). https:\/\/www.blog.udonis.co\/digital-marketing\/media-buying-campaign-geos"},{"key":"17_CR80","unstructured":"Merrill, J.B., Allen, M.: \u201cTrumpcare\u201d does not exist. Nevertheless Facebook and Google cash in on misleading ads for \u201cGarbage\u201d health insurance. In: ProPublica (2020). https:\/\/www.propublica.org\/article\/trumpcare-does-not-exist-nevertheless-facebook-and-google-cash-in-on-misleading-ads-for-garbage-health-insurance"},{"key":"17_CR81","unstructured":"Merrill, J.B., Kozlowska, H.: How Facebook fueled a precious-metal scheme targeting older conservatives. In: Quartz (2019). https:\/\/qz.com\/1751030\/facebook-ads-lured-seniors-into-giving-savings-to-metals-com\/"},{"key":"17_CR82","unstructured":"Miedema, F., Lubbertsen, K., Schrama, V., van Wegberg, R.: Mixed signals: analyzing ground-truth data on the users and economics of a bitcoin mixing service. In: USENIX Security, pp.\u00a0751\u2013768 (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/miedema"},{"key":"17_CR83","unstructured":"Moreva, U.: CPA aggregators. Cheating or the best solution for marketers? Affbank (2018). https:\/\/affbank.com\/blog\/https%5C%3A%5C%2F%5C%2Faffbank.com%5C%2Fblog%5C%2Fcpa_aggregators"},{"key":"17_CR84","unstructured":"Nazarova, D., Bystrova, I.: Supreme guide to affiliate marketing verticals. RedTrack (2020). https:\/\/redtrackmarketing.s3.eu-central-1.amazonaws.com\/Affiliate+Marketing+Verticals+Guide.pdf"},{"key":"17_CR85","unstructured":"Nelms, T., Perdisci, R., Antonakakis, M., Ahamad, M.: Towards measuring and mitigating social engineering software download attacks. In: USENIX Security, pp. 773\u2013789 (2016)"},{"key":"17_CR86","unstructured":"Noroozian, A., et al.: Platforms in everything: analyzing ground-truth data on the anatomy and economics of bullet-proof hosting. In: USENIX Security, pp.\u00a01341\u20131356 (2019)"},{"key":"17_CR87","doi-asserted-by":"publisher","unstructured":"Paquet-Clouston, M., Garc\u00eda, S.: On the motivations and challenges of affiliates involved in cybercrime. In: Trends in Organized Crime (2022). https:\/\/doi.org\/10.1007\/s12117-022-09474-x","DOI":"10.1007\/s12117-022-09474-x"},{"key":"17_CR88","doi-asserted-by":"publisher","unstructured":"Paquet-Clouston, M., Paquette, S.-O., Garcia, S., Erquiaga, M.J.: Entanglement: cybercrime connections of a public forum population. In: J. Cybersecur. 8(1) (2022). https:\/\/doi.org\/10.1093\/cybsec\/tyac010","DOI":"10.1093\/cybsec\/tyac010"},{"key":"17_CR89","doi-asserted-by":"publisher","unstructured":"Pastrana, S., Thomas, D.R., Hutchings, A., Clayton, R.: CrimeBB: enabling cybercrime research on underground forums at scale. In: 2018 World Wide Web Conference, pp.\u00a01845\u20131854 (2018). https:\/\/doi.org\/10.1145\/3178876.3186178","DOI":"10.1145\/3178876.3186178"},{"key":"17_CR90","doi-asserted-by":"publisher","unstructured":"Redmiles, E.M., Chachra, N., Waismeyer, B.: Examining the demand for spam: who clicks? In: 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201310 (2018). https:\/\/doi.org\/10.1145\/3173574.3173786","DOI":"10.1145\/3173574.3173786"},{"key":"17_CR91","unstructured":"Samosseiko, D.: The partnerka - what is it, and why should you care?. In: 19th Virus Bulletin International Conference, pp.\u00a0115\u2013120 (2009). https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/technical%20papers\/samosseikovb2009paper.pdf"},{"key":"17_CR92","unstructured":"Schechter, E., Ruscone, G.G., El Idrissi, B.S.: Notifying Users of Unclear Subscription Pages. Chromium Blog (2018). https:\/\/blog.chromium.org\/2018\/11\/notifying-users-of-unclear-subscription.html"},{"key":"17_CR93","unstructured":"Silverman, C.: Ads Inc. Shut down, but the tools it used to trick people on Facebook have lived on. In: BuzzFeed News (2020). https:\/\/www.buzzfeednews.com\/article\/craigsilverman\/ads-inc-crypto-scams-facebook"},{"key":"17_CR94","unstructured":"Silverman, C.: How a massive facebook scam siphoned millions of dollars from unsuspecting boomers. In: BuzzFeed News (2019). https:\/\/www.buzzfeednews.com\/article\/craigsilverman\/facebook-subscription-trap-free-trial-scam-ads-inc"},{"key":"17_CR95","unstructured":"Silverman, C., Davis, T.: Coronavirus mask ads were emailed to millions of americans with unsafe claims and inflated prices. In: BuzzFeed News (2020). https:\/\/www.buzzfeednews.com\/article\/craigsilverman\/coronavirus-mask-ads-were-emailed-to-millions-of-americans"},{"key":"17_CR96","unstructured":"Soska, K., Christin, N.: Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: USENIX Security, pp. 33\u201348 (2015)"},{"key":"17_CR97","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Abman, R., Kemmerer, R.A., Kruegel, C., Steigerwald, D.G., Vigna, G.: The Underground economy of fake antivirus software. In: Economics of Information Security and Privacy III, pp. 55\u201378 (2013)","DOI":"10.1007\/978-1-4614-1981-5_4"},{"key":"17_CR98","doi-asserted-by":"publisher","unstructured":"Subramani, K., Yuan, X., Setayeshfar, O., Vadrevu, P., Lee, K.H., Perdisci, R.: When push comes to ads: measuring the rise of (malicious) push advertising. In: IMC, pp.\u00a0724\u2013737 (2020). https:\/\/doi.org\/10.1145\/3419394.3423631","DOI":"10.1145\/3419394.3423631"},{"key":"17_CR99","unstructured":"Sullivan, S.: I May never text again: more Facebook spam. News from the Lab - F-Secure Labs (2010). https:\/\/archive.f-secure.com\/weblog\/archives\/00002016.html"},{"key":"17_CR100","doi-asserted-by":"publisher","unstructured":"Szurdi, J., Luo, M., Kondracki, B., Nikiforakis, N., Christin, N.: Where are you taking me? Understanding abusive traffic distribution systems. In: Web Conference, pp.\u00a03613\u20133624 (2021). https:\/\/doi.org\/10.1145\/3442381.3450071","DOI":"10.1145\/3442381.3450071"},{"key":"17_CR101","unstructured":"Thomas, K., et al.: Framing dependencies introduced by underground commoditization. In: 14th Annual Workshop on the Economics of Information Security (2015)"},{"key":"17_CR102","unstructured":"Thomas, K., et al.: Investigating commercial pay-per-install and the distribution of unwanted software. In: USENIX Security, pp.\u00a0721\u2013738 (2016)"},{"key":"17_CR103","unstructured":"Top Affiliate Marketing Verticals of 2021. Pushground Blog (2021). https:\/\/www.pushground.com\/blog\/top-affiliate-marketing-verticals"},{"key":"17_CR104","unstructured":"Types of Inventory Available. Zeropark (2020). https:\/\/web.archive.org\/web\/20200926093930\/https:\/\/doc.zeropark.com\/en\/inventory_types.html"},{"key":"17_CR105","doi-asserted-by":"publisher","unstructured":"Vadrevu, P., Perdisci, R.: What you see is NOT what you get: discovering and tracking social engineering attack campaigns. In: IMC, pp. 308\u2013321 (2019). https:\/\/doi.org\/10.1145\/3355369.3355600","DOI":"10.1145\/3355369.3355600"},{"key":"17_CR106","unstructured":"Verheyden, T., Meijer, F., Dorjbayar, A.: Wij klikten op een valse advertentie met Philippe Geubels zodat u het niet hoeft te doen. In: VRT NWS (2019). https:\/\/www.vrt.be\/vrtnws\/nl\/2019\/09\/04\/wij-klikten-op-de-nepadvertenties-met-philippe-geubbels-en-kwame\/"},{"key":"17_CR107","doi-asserted-by":"publisher","unstructured":"Wang, D.Y., et al.: Search + seizure: the effectiveness of interventions on SEO campaigns. In: 2014 Internet Measurement Conference, pp. 359\u2013372 (2014). https:\/\/doi.org\/10.1145\/2663716.2663738","DOI":"10.1145\/2663716.2663738"},{"key":"17_CR108","unstructured":"Washington State AG and Facebook Target \u201cClickjackers\u201d $$|$$ Washington State. Washington State Office of the Attorney General (2012). https:\/\/www.atg.wa.gov\/news\/news-releases\/washington-state-ag-and-facebook-target-clickjackers"},{"key":"17_CR109","unstructured":"van Wegberg, R., et al.: Plug and prey? Measuring the commoditization of cybercrime via online anonymous markets. In: USENIX Security, pp. 1009\u20131026 (2018)"},{"key":"17_CR110","unstructured":"Weinglass, S.: Israel bans binary options industry, finally closing vast, 10-year fraud. In: The Times of Israel (2017). https:\/\/www.timesofisrael.com\/israel-bans-entire-binary-options-industry-finally-closing-vast-10-year-fraud\/"},{"key":"17_CR111","unstructured":"Wewe Media. Complete List of TIERS & Countries. AffiliateFix (2018). https:\/\/www.affiliatefix.com\/threads\/complete-list-of-tiers-countries.147158\/"},{"key":"17_CR112","unstructured":"What Is a Tier of Traffic and What Tier Should You Choose? PropellerAds Blog (2018). https:\/\/propellerads.com\/blog\/what-is-a-tier-of-traffic-and-what-tier-should-you-choose\/"},{"key":"17_CR113","unstructured":"What Tier to Choose for Ads Campaign. RichAds Blog (2020). https:\/\/richads.com\/blog\/what-tier-to-choose-profitable-geos-for-advertising-campaigns-in-tier-1-2-or-3\/"},{"key":"17_CR114","unstructured":"White, J.: Takedowns and Adventures in Deceptive Affiliate Marketing. Unit42 (2019). https:\/\/unit42.paloaltonetworks.com\/takedowns-and-adventures-in-deceptive-affiliate-marketing\/"},{"key":"17_CR115","doi-asserted-by":"publisher","unstructured":"Xu, X., et al.: Dissecting mobile offerwall advertisements: an explorative study. In: 2020 IEEE 20th International Conference on Software Quality, Reliability and Security, pp. 518\u2013526 (2020). https:\/\/doi.org\/10.1109\/QRS51102.2020.00072","DOI":"10.1109\/QRS51102.2020.00072"},{"key":"17_CR116","doi-asserted-by":"publisher","unstructured":"Yang, H., et al.: Casino royale: a deep exploration of illegal online gambling. In: 2019 Annual Computer Security Applications Conference, pp. 500\u2013513 (2019). https:\/\/doi.org\/10.1145\/3359789.3359817","DOI":"10.1145\/3359789.3359817"},{"key":"17_CR117","unstructured":"Yang, Z., Allen, J., Landen, M., Perdisci, R., Lee, W.: TRIDENT: towards detecting and mitigating web-based social engineering attacks. In: USENIX Security, pp. 6701\u20136718 (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/yang-zheng"},{"key":"17_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102388","volume":"109","author":"J Yuste","year":"2021","unstructured":"Yuste, J., Pastrana, S.: Avaddon ransomware: an in-depth analysis and decryption of infected systems. Comput. Secur. 109, 102388 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102388","journal-title":"Comput. Secur."},{"key":"17_CR119","unstructured":"Zellweger, C., Kohler, F.: How scam networks use fake celebrity ads to lure online investors. SWI swissinfo.ch (2024). https:\/\/www.swissinfo.ch\/eng\/life-aging\/how-scam-networks-use-fake-celebrity-ads-to-lure-investors\/82568794"},{"key":"17_CR120","unstructured":"Zeng, E., Kohno, T., Roesner, F.: Bad news: clickbait and deceptive ads on news and misinformation websites. In: ConPro (2020)"},{"key":"17_CR121","doi-asserted-by":"publisher","unstructured":"E., Kohno, T., Roesner, F.: What makes a \u201cbad\u201d ad? User perceptions of problematic online advertising. In: CHI, vol. 361 (2021). https:\/\/doi.org\/10.1145\/3411764.3445459","DOI":"10.1145\/3411764.3445459"},{"key":"17_CR122","unstructured":"Zulma Corporation Limited. Add Your Network. OfferVault. https:\/\/offervault.com\/add-your-network"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-85960-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:08:42Z","timestamp":1753884522000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-85960-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031859595","9783031859601"],"references-count":122,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-85960-1_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Passive and Active Network Measurement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 March 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 March 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pam2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/udesa.edu.ar\/pam25","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}