Stolen Organic Installs
Every install attributed to click injection is an organic install you are now paying for. Your organic growth appears to stagnate while paid channels seem to perform well.
Fraud Type Guide
Fraudsters use malware to hijack attribution for organic app installs, claiming credit and CPI payments for installs they never drove. Learn how it works and how to stop it.
Click injection is one of the most sophisticated forms of mobile ad fraud. It targets the attribution system that determines which ad network or publisher deserves credit (and payment) for driving an app install. By injecting a precisely timed fake click, fraudsters steal CPI payouts for installs that would have happened organically.
Unlike click spamming, which sends massive volumes of random clicks hoping some will coincidentally match with installs, click injection is surgical. It exploits Android’s install broadcast system to detect the exact moment a new app is being downloaded, then fires a click at precisely the right time to claim last-click attribution.
The result is that advertisers pay for installs they were already getting for free, while the fraudsters pocket CPI payments they did nothing to earn. Click injection is especially damaging because the installs themselves are real — real users on real devices — making it harder to detect than fraud involving fake installs or bot traffic.
Click injection follows a precise sequence that exploits the mobile app installation process and the attribution window system used by mobile measurement partners.
A user unknowingly installs a malicious app — often a utility app, flashlight, or game — that contains hidden click injection code. The app requests broad permissions including the ability to monitor other app installations.
On Android, the system broadcasts an intent when a new app download begins. The malicious app listens for this broadcast and detects when the user starts downloading a new app.
The malware immediately fires a fake ad click attributed to the fraudster's network, timed to land just before the install completes. This click enters the attribution system's last-click window.
When the new app opens and the attribution SDK checks for the last click, it finds the injected click and credits the fraudster's network. The advertiser pays CPI to the fraudster for an organic install.
Click injection creates a range of problems that extend beyond the immediate financial loss of paying for organic installs.
Every install attributed to click injection is an organic install you are now paying for. Your organic growth appears to stagnate while paid channels seem to perform well.
Click injection makes fraudulent channels appear effective, skewing your understanding of which networks genuinely drive installs and leading to misallocated acquisition budgets.
By claiming credit for organic installs, fraudsters dilute the true cost per incremental install. Your reported CPI looks reasonable, but the incremental CPI is far higher.
When click injection sources appear to deliver quality users (because the installs are real people), you invest more in fraudulent channels and less in networks that truly drive growth.
The primary method for detecting click injection is click-to-install time (CTIT) analysis. Because the fraudulent click is fired moments before the install completes, click injection produces characteristically short CTITs.
Legitimate installs show a natural distribution of time between click and install, typically ranging from minutes to hours. Click injection produces CTITs of under 10 seconds — often as low as 2–5 seconds.
Sources with unusually high install rates relative to clicks (near 100% conversion) are a strong indicator of click injection, since the click is only fired when an install is already in progress.
Install patterns that spike immediately after new app releases or marketing pushes suggest attribution hijacking, as fraudsters target periods of high organic activity.
Publishers where user quality metrics (retention, revenue) look suspiciously similar to your organic users — because they are organic users whose installs were hijacked.
Opticks analyses click-to-install time distributions for every source, automatically flagging networks with statistically anomalous CTIT patterns that indicate click injection activity.
Granular reporting identifies which publishers and sub-publishers are generating click-injected installs, giving you the data to exclude fraudulent sources and protect your budget.
Opticks combines CTIT analysis with device fingerprinting, publisher reputation data, and behavioural patterns to detect sophisticated click injection that attempts to evade single-signal detection.
Keep Exploring
See how Opticks identifies click injection and ensures you only pay for installs that were genuinely driven by your campaigns. No code changes required.