Mobile Gambling - Sportsbooks Face Growing Fraud

The sports betting industry has seen rapid digitalisation as punters increasingly use mobile devices as their go-to method of betting. However, their convenience, especially in live betting scenarios, exposes the industry to significant fraudulent activities.

Mobile betting remains the dominant method of online gambling in the UK. This is particularly true for younger people, with three quarters of 18-34 year old online gamblers using a smartphone to gamble compared to only 14% of those aged 65 and over (according to the The Gambling Commission.)

This large audience makes it more likely that fraudsters will target sportsbooks, making it crucial for them to have a strategy in place for protecting bettors from fraud.

Non-genuine engagement and fraudulent activity is happening completely undetected, siphoning away campaign margins from sportsbooks and hindering growth.  Guarding against this fraud not only ensures campaigns reach their maximum potential, but also helps protect brand reputation. By taking a proactive stance, sportsbooks can prevent further funds from flowing through to fraud.

Mounting Digital Threats

The mobile betting market is set to expand considerably over the next few years, with Market Research Future estimating the market size will reach $173.87 billion in 2032. This growth will further incentivise fraudsters to target the industry.

These fraudsters use invalid traffic (IVT) to exploit sportsbooks’ advertising campaigns with concerning levels of success. IVT consists of any activity originating from sources lacking genuine user interest. This includes ad fraud carried out by threat actors, typically by using bots. This adversely affects sportsbooks by artificially inflating impressions, so mobile advertising campaigns appear to be performing much better than they actually are. Not only does this waste ad spend for Sportsbooks, it also misleads them with fundamentally flawed campaign data on which they make future ad spend decisions. 

Artificial Intelligence (AI) powered bots are also used by fraudsters regularly to create and carry out frequent attacks. These bots create masses of fake accounts, inflating campaign data and abusing sportsbook’s promotions. This significantly drains campaign resources, and our research shows on average around 5-7% of sports betting campaigns are affected.

Conventional anti-fraud tools deployed on mobiles don’t operate at the impression or click level, and therefore fail to identify IVT, leaving sportsbooks vulnerable to threats.

Non-genuine engagement from returning users also poses a challenge for sportsbooks, as loyal customers unintentionally drive-up costs. When these users attempt to navigate back to a website, they can end up clicking on paid brand advertisements. This inflates customer acquisition costs (CACs), and as these existing users won't generate new conversions, the sportsbook faces a loss. Without a strategy to manage their traffic and control non-genuine engagement, sportsbooks will continue to be vulnerable to fraud and optimising their campaign value will be even more difficult.

Being Proactive In The Fight Against Fraud

To adapt to an evolving market, sportsbooks must embrace mobile betting. As most anti-fraud tools on mobiles lack the ability to identify more sophisticated threat methods, it’s crucial to develop a strategy to augment this vulnerability. This way sportsbooks can then reap the benefits of the mobile betting industry while protecting themselves and their users.

Here are some of the steps sportsbooks can take to mitigate campaign losses:

Traffic Monitoring:  The biggest advantage fraudsters leverage is IVT’s ability to pass through systems unnoticed. It’s possible to circumvent this by regularly monitoring traffic. This provides valuable insights into campaign data, and sportsbooks can discover any indicators that fraudulent activity is occurring. This can then be swiftly dealt with and the threat to margins will be removed.

Install an Ad-Verification Platform:  Bots can be deployed in overwhelming numbers, making it increasingly challenging for teams to effectively monitor their traffic. To ensure fraudulent traffic doesn’t slip through the cracks, an ad-verification platform can be utilised to boost operational efficiency. These platforms can determine if traffic is legitimate by identifying its source in real time. Suspicious traffic can then be blocked, mitigating any threat to budgets.

Set Custom Verification Rules:  To control the number of times a user interacts with a campaign, sportsbooks can set custom verification rules. This limits the number of times a particular user can click on an ad as once they pass the set threshold, they’ll no longer see the advertisement. This prevents bots or other non-genuine forms of engagement from repeatedly attempting to engage with an ad. The result is significantly reduced cost-per-click (CPC) rates and budgets protected from bot spam.

Staying Ahead Of Fraudsters

As the digital landscape continues to develop, fraud tactics are evolving, becoming increasingly complex to both identify and mitigate. If sportsbooks want to successfully reap the benefits of a booming mobile betting market, they have to ensure they’ve taken the right steps to protect themselves first.

Monitoring and verifying traffic can help prevent fraudulent activity from passing through systems and impacting budgets. With full transparency into their data, sportsbooks can make sure they are the only ones that get to enjoy their margins.

Elie Shuggi is CPO at  TrafficGuard

Image: Ideogram

You Might Also Read: 

Open Banking, Security, APIs & Mobile Apps:

DIRECTORY OF SUPPLIERS - Fraud Detection & Prevention:

__________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« LockBit Resurrection
Stolen NHS Data Published On The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

CERT Syria

CERT Syria

CERT Syria is the national Computer Emergency Response Team for Syria.

European Recruitment

European Recruitment

European Recruitment is an award-winning, international recruitment agency specialising in niche technology areas including Cyber Security.

Resolver

Resolver

Resolver’s Integrated Risk Management platform helps plan and prepare your organization to limit the likeliness or impact of security risk and compliance events from occurring.

Cyber Security Operations Consulting (CyberSecOp)

Cyber Security Operations Consulting (CyberSecOp)

CyberSecOp is an ISO 27001 Certified Organization which provides cyber security operations services and risk management consulting.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Techsolidity

Techsolidity

Techsolidity is an emerging e-learning platform that offers a wide range of upskilling programs worldwide in areas including cybersecurity.

SignMyCode

SignMyCode

SignMyCode is a one-stop shop for trusted and authentic code signing solutions to safeguard software.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.