Malicious WordPress Plugins Drive 1.4 Billion Ad Requests Daily in Ad Fraud Scheme

A sprawling ad fraud operation, codenamed “Scallywag,” has been disrupted after generating a staggering 1.4 billion fraudulent ad requests per day at its peak, according to threat intelligence researchers.

Built around a suite of WordPress plugins, Scallywag enabled cybercriminals to monetize digital piracy and URL-shortening sites on an industrial scale, all while evading detection through sophisticated cloaking and referral obfuscation techniques.

Monetizing Piracy: How Scallywag Worked

Traditional advertisers avoid piracy and URL-shortening sites due to legal risks and brand safety concerns.

Scallywag exploited this gap with four custom WordPress plugins—Soralink, Yu Idea, WPSafeLink, and Droplink—designed to insert intermediary, ad-laden pages between piracy catalog sites and the actual pirated content.

These plugins forced users to interact with multiple ads, CAPTCHAs, and wait timers before accessing their desired content, generating massive volumes of ad impressions and revenue for the operators.

The operation’s scale was immense: at its height, Scallywag’s infrastructure spanned over 400 cashout domains, collectively issuing up to 1.4 billion ad requests daily.

The plugins’ as-a-service model allowed aspiring digital pirates to purchase or freely obtain the tools, customize their monetization paths, and even access extensive online tutorials for setup and optimization.

Cloaking and Obfuscation: Hiding in Plain Sight

A hallmark of Scallywag’s success was its use of advanced cloaking. When ad platforms or advertisers visited the intermediary pages directly, they appeared as benign blogs.

Only users redirected from piracy catalog sites encountered the ad-heavy, incentive-laden versions.

This false representation made it difficult for ad networks to detect the fraud.

To further evade scrutiny, Scallywag operators employed open redirectors—routing traffic through platforms like Google or social media to “sanitize” referral data.

This tactic masked the true origin of the traffic, making it appear organic and legitimate to advertisers, much like pirates flying a friendly flag until the moment of attack.

Disruption and Aftermath

The Satori Threat Intelligence and Research team at HUMAN detected Scallywag through anomalous traffic patterns, such as unusually high ad impression volumes and forced user interactions on seemingly innocuous WordPress blogs.

By collaborating with ad providers to block fraudulent bid requests and flagging suspicious domains, HUMAN slashed Scallywag’s traffic by 95%, effectively collapsing its ecosystem.

Despite this success, researchers warn that threat actors continue to adapt, rotating domains and seeking new ways to monetize illicit traffic.

The rise and fall of Scallywag underscores both the persistent ingenuity of cybercriminals and the ongoing arms race in ad fraud and digital piracy defense.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here