educational

IP Cloaking, Other Exploits Impact Website Traffic Flow

It’s not often discussed, especially by traffic brokers, but a significant percentage of adult website traffic is essentially worthless — comprised of “skimmed” traffic; a purely euphemistic expression for forcibly redirected surfers, who clicked on one thing and then received another — or is made up of artificially generated “hits.”

This traffic is shuffled site to site, vendor to vendor; each taking a bite at the apple, but with a prospect that is likely annoyed, distrusting and unwilling to offer up payment or personally-identifying information at a site he “mysteriously” arrived at.

The concept behind cloaking is simple: serve benign content to detection systems, but serve malicious content to normal web page visitors.

While advanced trade scripts and careful monitoring can help improve the traffic mix, fraudulent website operators are upping the ante by aggressively cloaking their domains — obfuscating traffic sources and opening the door to widespread malware distribution, among other threats to computer security — as well as committing ad network fraud.

One problem with all of this is that a bad user experience on one site may tarnish the reputation of the referring site. For example, clicking a thumb on your favorite TGP puts you into a redirect chain that leaves your computer infested with malware: would you return to the original TGP or find another? Sure, as the TGP owner, you may think that your site is on the up-and-up, but when linking to others, especially unknown entities, the results can never really be predicted.

Highlighting the problem is a recent report from Google detailing four years of data gathered from its Safe Browsing initiative, covering 160 million pages on 8 million sites.

“Each day we show around 3 million malware warnings to over four hundred million users whose browsers implement the Safe Browsing API,” Google’s Security Team says. “Like other service providers, we are engaged in an arms race with malware distributors.”

The report, entitled “Trends in Circumventing Web-Malware Detection,” reveals the depth of this technological arms race and is available as a downloadable PDF document (research.google.com/archive/papers/rajab-2011a.pdf).

Noted in the report is the trend of social engineering attacks. For example, using false malware warnings to encourage users to download and install an “anti-virus” tool, which actually contains the malware. More commonly used, however, are “drive by” exploits, which target vulnerabilities in the website visitor’s browser or plugins; but cloaking is a common denominator in many attacks.

“Malware distributors are increasingly relying upon ‘cloaking’ as a technique to evade detection,” the Security Team added. “The concept behind cloaking is simple: serve benign content to detection systems, but serve malicious content to normal web page visitors.”

Related:  

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

The SCREEN Test: How to Prepare for Federal Age Verification

For those who are counting, there are now 20 enacted state laws in the United States requiring age verification for viewing online adult content, plus numerous proposed laws in the works. This ongoing barrage has been exhausting for many in the adult industry — and it may be about to escalate in the form of a potential new AV law, this time at the federal level.

Corey D. Silverstein ·
opinion

How to Master Team Dynamics for Business Success

Having the right team in place is everything. Whether getting a startup off the ground and thriving, or safeguarding an established company, the right — or wrong — people can mean the difference between a successful venture and a failed dream.

Juicy Jay ·
opinion

Eight Steps to Fast-Track AI Site Approval for Processing

Artificial intelligence is a hot topic these days. AI technology is speeding up the way we do business across all industries and offers numerous benefits, from automating processes to increasing efficiency and scalability.

Cathy Beardsley ·
opinion

How to Secure High-Risk Transactions With Network Tokenization

Ensuring the security of data as it moves through digital channels is the foundation of safe transactions, and crucial for your success. If your business can’t secure transactions, you’re exposed to myriad processing traumas.

Jonathan Corona ·
profile

WIA Profile: Reba Rocket

As chief operating officer and chief marketing officer of Takedown Piracy, long at the forefront of intellectual property protection in adult entertainment, Rocket is dedicated to safeguarding the livelihoods of content creators and producers while fostering a more ethical and sustainable industry.

Women In Adult ·
opinion

Protecting Content Ownership Rights When Using AI

In today’s digital age, content producers have more tools at their disposal than ever before. Among these tools, artificial intelligence (AI) content generation has emerged as a game changer, enabling creators to produce high-quality content quickly and efficiently.

Corey D. Silverstein ·
opinion

How Payment Orchestration Can Help Your Business

An emerging payment solution is making waves in the merchant world: the payment orchestration platform (POP). It’s quickly gaining traction as a powerful tool for managing online payments — but questions abound.

Cathy Beardsley ·
opinion

Fine-Tuning Refund and Cancellation Policies

For adult websites, managing refunds and cancellations isn’t just about customer service. It’s a crucial factor in maintaining compliance with the regulations of payment processors and payment networks such as Visa and Mastercard.

Jonathan Corona ·
profile

WIA Profile: Laurel Bencomo

Born in Cambridge, England but raised in Spain, Laurel Bencomo initially chose to study business at the University of Barcelona simply because it felt familiar — both of her parents are entrepreneurs. She went on to earn a master’s degree in sales and marketing management at the EADA Business School, while working in events for a group of restaurants in Barcelona.

Women In Adult ·
profile

Gregory Dorcel on Building Upon His Brand's Signature Legacy

“Whether reflected in the storyline or the cast or even the locations, the entertainment we deliver is based on fantasy,” he elaborates. “Our business is not, and never has been, reality. People who are buying our content aren’t expecting reality, or direct contact with stars like you can have with OnlyFans,” he says.

Jeff Dana ·
Show More