Gary Danks Gary Danks 13th Jun, 2018
This fraudulent app install hierarchy displays the family group (tier 1), the fraud category (tier 2), and the method used (tier 3) to generate the app install. 


For example, Attribution Fraud is the family group, Install Hijacking is the category and Malware is the method. 

Blog: Fraudulent App Install Hierarchy


For this and more, we recommend our Welcome To Fraud: Install Fraud By Numbers (Infographic)


At Machine, we can help you detect app install fraud, and make sure your UA budget is converting into real users' budget.
Talk to Machine in confidence about a life without fraudulent installs