Feeds

Scandal ad slingers cough up $100k in 'Facebook clickjack' case

Marketing biz 'earning $1.2m a month' settles out of court

The Power of One eBook: Top reasons to choose HP BladeSystem

A marketing firm accused of running campaigns via a web of unscrupulous affiliates – who flooded Facebook with spam – has agreed to clean up its network. The business's owners settled a lawsuit brought against them and have denied any wrongdoing.

Delaware-based Adscend Media allegedly made $1.2m (£743k) per month1 from messages supposedly offering "scandalous or provocative content".

In reality the attached links often led towards sites that coaxed punters into handing over personal information as part of "online surveys" which then failed to dish the promised dirt.

These polls were allegedly also promoted by the use of "likejacking" in which Facebook users were tricked into clicking on "like" buttons, inadvertently punting sales pitches at their friends.

The allegations prompted a lawsuit by the Washington State Attorney General's Office against Adscend and its co-owners – Jeremy Bash of Huntington, West Virginia and Fehzan Ali, of Austin, Texas – in January.

The defendants settled the case this week by paying $100,000 (£61k) in attorneys’ costs and fees and agreeing to an injunction prohibiting unethical marketing behaviour - the court decree is here [PDF]. The defendants also agreed to pay for independent monitoring of the firm's affiliate network.

A statement by the Washington State Attorney General’s Office can be found here.

Last week Facebook dropped a separate lawsuit against Adscend Media.

A detailed discussion of how clickjacking works, along with a discussion of the Adscend Media settlement, can be found in a post on Sophos' Naked Security blog here. ®

Lootnote

1 Adscend counters that Washington's estimates are grossly overestimated without saying what its real revenues were nor admitting any liability on its own part. It blames rogue affiliates for the offending messages.

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.