B&TB&TB&T
  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Technology
  • Regulars
    • Agency Scorecards
    • Best of the Best
    • Campaigns of the Month
    • CMO Power List
    • CMOs to Watch
    • Culture Bites
    • Fast 10
    • New Business Winners
    • Spotlight on Sponsors
  • Jobs
  • Awards
    • 30 Under 30
    • B&T Awards
    • Cairns Crocodiles
    • Women In Media
    • Women Leading Tech
Search
Trending topics:
  • Cairns Crocodiles
  • Nine
  • Seven
  • Federal Election
  • Pinterest
  • AFL
  • AI
  • WPP
  • Anthony Albanese
  • NRL
  • EssenceMediaCom
  • Thinkerbell
  • Channel 10
  • News Corp
  • Spotlight on Sponsors
  • State of Origin
  • Cairns Hatchlings
  • TV Ratings
  • Radio Ratings
  • Sports Marketing

  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise
© 2025 B&T. The Misfits Media Company Pty Ltd.
Reading: Integral Ad Science Uncovered A Malicious VPN App With Over One Million Downloads
Share
B&TB&T
Subscribe
Search
  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Technology
  • Regulars
    • Agency Scorecards
    • Best of the Best
    • Campaigns of the Month
    • CMO Power List
    • CMOs to Watch
    • Culture Bites
    • Fast 10
    • New Business Winners
    • Spotlight on Sponsors
  • Jobs
  • Awards
    • 30 Under 30
    • B&T Awards
    • Cairns Crocodiles
    • Women In Media
    • Women Leading Tech
Follow US
  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise
© 2025 B&T. The Misfits Media Company Pty Ltd.
B&T > Marketing > Integral Ad Science Uncovered A Malicious VPN App With Over One Million Downloads
Marketing

Integral Ad Science Uncovered A Malicious VPN App With Over One Million Downloads

Staff Writers
Published on: 12th May 2023 at 2:59 PM
Edited by Staff Writers
Share
6 Min Read
Warning sign placed on a table while businesswoman work.
SHARE

Integral Ad Science (IAS) identified a malicious app that surreptitiously converts users’ mobile devices into proxies for ad fraud.

The estimated waste to advertiser spend is $2M per month in fraudulent video ad inventory. Oko VPN app, a free-to-download, free-to-use app available on multiple app stores including Google Play, allows users to disguise their IP addresses to servers across the world. Available for download since July 2022, Oko has experienced exponential growth, with half a million users in late November 2022 and over a million at the time of its takedown in March 2023. Oko VPN’s user base is predominantly in the United States, Germany, and Russia. However, it is used worldwide.

BACKGROUND STORY

Oko VPN’s free service comes with a hidden cost. Unbeknownst to its users, the app contains malicious code that turns a user’s phone into a relay for fraudulent traffic. While you are disguising your identity and traffic through Oko VPN’s server IPs, Oko VPN is disguising its ad traffic through your IP. Users who download Oko VPN unwittingly donate their residential IP addresses for use by the app’s operators. Oko VPN’s operators use donated IPs to make server-based fraudulent ad traffic appear to originate from real human users behind residential IPs. Oko VPN users also put themselves at risk of relaying email traffic. Technically, any TCP or UDP traffic may be relayed through donated IPs. This opens up IP donors to potential liability for illicit traffic that flows through their respective networks.

THE VALUE OF UNIQUE AND DIVERSE IP ADDRESSES

Think of ad operations (and ad fraud operations) as you would a fire. A vibrant fire requires three key ingredients: oxygen, fuel, and ignition. A vibrant organic ad operation also requires three key ingredients:

● Computation assets for ad event rendering

● Unique residential IP addresses for ad event beaconing

● Time (or scale) Akin to effective organic ad operations, effective ad fraud operations also require a diverse array of residential IP addresses… or proxies.

USE IN AD FRAUD

Similar to many other residential IP hijacking schemes, the residential IP network cultivated by Oko VPN appeared to deal heavily in ad fraud. Of the traffic that was observed to pass through compromised devices, the majority was directed at video streaming platforms. Interestingly, video ad traffic was observed to have been unaccompanied by content video. In other words, advertisement beacons were proxied through compromised devices, but content video streams were not. Oko VPN operators’ may have opted for this design decision as:

● Victim video platforms may not verify if ad beacons were fired from within the same contexts as those of content video requests. In other words, platforms may not verify if the IP addresses firing ad beacons were the same addresses requesting content video from CDNs.

● Oko VPN operators were conscious of the need to minimize mobile data and power drainage on victim devices in order to evade detection.

USE IN AD FRAUD CONT.

Another noteworthy pattern observed was the scarcity of ad beacons fired from devices on any given day. Regardless of if the app was actively tunneling user traffic or laying dormant in the background, only a handful of video ad beacon traffic was observed daily. This scarce utilization of compromised IPs is not an oddity when it comes to residential proxy-based fraud. If a network of hijacked residential IPs is of any substantial size, operators may be highly selective in to how they employ addresses. Common modus operandi is to minimize the use of any single IP address so as not to draw attention to it (so as to avoid IP based blocking). This is a hallmark example of the more sophisticated ad fraud techniques that our industry faces today. More transparent standards, monitoring and industry-wide information sharing are critical to combat this type of growing threat.

IMPACT ESTIMATE

Integral Ad Science estimates that Oko VPN was generating approximately 100 million fraudulent impressions per month at the time of its takedown from the Google Play Store. This equates to $2 million per month in wasted advertiser spend at a $20 video CPM rate.

● The IAS Threat Lab team collaborated with the Google Play Store team on the takedown.

● On March 23, 2023, Google removed the app and enforced Google Play Protect, which warns users and prompts them to uninstall the malicious app.

● The IAS Threat Lab team has contacted affected video platforms to provide assistance in building stronger checks against threats like those posed by Oko VPN.

Join more than 30,000 advertising industry experts
Get all the latest advertising and media news direct to your inbox from B&T.

No related posts.

Share
Nehir Hatipoglu
By Nehir Hatipoglu
Follow:
Nehir joined B&T in early 2023 as an editorial coordinator and journalist after graduating from the University of Sydney with a degree in Media & Marketing in 2022.

Latest News

TV Ratings (12/6/2025): 1.4 Million People Viewed The Western Bulldogs Kicking Its Way Into The Top Eight
13/06/2025
WARC Downgrades Global Ad Spend Forecast Amid “Trade Tensions” & Uncertain Tech Market
13/06/2025
Marketers Call For Measurement ‘Parity’ In Video, But One Buyer Warns ‘Be Careful What You Wish For’
13/06/2025
Meta Cracks Down On Nudify Apps & Sues Hong Kong Developer Behind CrushAI
13/06/2025
//

B&T is Australia’s leading news publication magazine for the advertising, marketing, media and PR industries.

 

B&T is owned by parent company The Misfits Media Company Pty Ltd.

About B&T

  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise

Top Categories

  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Opinion
  • Technology
  • TV Ratings

Sign Up for Our Newsletter



B&TB&T
Follow US
© 2025 B&T. The Misfits Media Company Pty Ltd. All Rights Reserved.
Welcome Back!

Sign in to your account

Register Lost your password?