Cookie Stuffing. What It Is and Who’s at Risk

⏱︎

Read time:

4–6 minutes
Cookie Stuffing. What It Is and Who's at Risk

Cookie stuffing is a type of affiliate‑fraud technique in which an attacker or dishonest publisher places affiliate or tracking cookies on a user’s device without the user’s meaningful consent or any legitimate interaction that would justify the cookie.

The purpose is to ensure that a future purchase or conversion is attributed to the attacker’s affiliate ID so they collect commission or referral credit they did not legitimately earn. Technically, cookie stuffing commonly uses hidden iframes, invisible image or script requests, background redirects, or browser extensions that silently load partner tracking URLs. Because these requests set cookies tied to affiliate accounts, later purchases made directly with the merchant appear to originate from the attacker’s referral and are credited accordingly.

Cookie stuffing vs. click‑hijacking

Cookie stuffing differs from click‑hijacking primarily in the presence and nature of user interaction. In click‑hijacking, a real user click exists but that click is intercepted, diverted, or forged so the attacker receives credit.

Click‑hijacking techniques can include overlaying invisible clickable elements on top of legitimate buttons, replacing link targets, manipulating event handlers, or inserting malicious redirects in a click pathway so that the user’s intended action triggers an attacker’s affiliate link.

By contrast, cookie stuffing does not require the user to click anything; cookies are dropped silently at page load or via background processes so attribution is pre‑set ahead of any purchase. The practical consequence is that cookie stuffing tends to be about preemptively claiming future conversions, while click‑hijacking is about stealing attribution tied to a specific user action.

Detection and remediation strategies

Detection and remediation strategies for cookie stuffing include suspicious signals include a high proportion of attributed conversions that have no corresponding incoming clicks, unusually large numbers of first‑touch attributions from low‑engagement or non‑referral pages, and affiliate IDs that show conversions originating from hidden or third‑party contexts.

Defenses that mitigate cookie stuffing include requiring click or interaction tokens for attribution, shortening cookie lifetimes, using server‑side verification of click events, implementing tokenized click IDs that must match a recorded click, and actively monitoring attribution patterns for anomalous referrers.

For click‑hijacking, detection focuses on abnormal redirect chains, mismatched click timestamps versus conversion timestamps, high volumes of clicks originating from suspicious sources, and user complaints about unexpected behaviors; defenses emphasize validating user gestures, checking referrer and origin headers, employing strict Content Security Policy and frame‑busting techniques, and auditing third‑party scripts and extensions.

Industries at risk

Brands and industries most exposed to cookie stuffing are those with high affiliate spend, valuable transactional events, or long cookie attribution windows. Retail and e‑commerce merchants face significant exposure because high volumes of direct purchases and heavy reliance on affiliate programs make stolen attribution lucrative.

Travel and hospitality providers, including airlines, hotels, and online travel agencies, are at risk because single bookings are high‑value transactions. Finance and insurance verticals, where leads, credit‑card signups, and policy purchases command large CPA payouts, attract commission‑diversion attempts. Telecom providers and utilities that offer recurring revenue streams are vulnerable because stolen attribution can yield ongoing value.

Gaming and gambling sites, subscription video and content platforms, and software/SaaS vendors that pay on trials or subscriptions are also frequent targets. Intermediaries such as coupon and cashback sites, affiliate networks, and ad‑tech platforms can both perpetrate and suffer from cookie stuffing, since they control tracking and attribution layers that attackers may try to manipulate. Smaller brands with lax attribution controls and long cookie windows are proportionally more at risk than those that enforce strict verification and short cookie durations.

Consequences of cookie‑stuffing

Several well‑documented cases illustrate the scale and consequences of cookie‑stuffing schemes. One of the most prominent examples involves eBay and affiliates such as Shawn Hogan and Brian Dunning. In the mid‑2000s eBay alleged that certain affiliates employed widgets, hidden redirects, and other techniques to drop eBay affiliate cookies at scale; eBay’s actions led to legal proceedings and criminal charges, with allegations of tens of millions of dollars in illicit commissions.

Another episode saw eBay pursue suits against partner sites and networks accused of secretly redirecting users to set eBay cookies, which exposed sophisticated evasion methods and prompted industry discussion about stronger attribution safeguards.

More recently, litigation and media coverage surrounding some popular browser extensions and aggregator tools alleged they overwrote or replaced creators’ affiliate cookies by opening hidden tabs or initiating background requests that diverted commissions — these disputes generated significant attention in industry press and court filings.

Security reporting documented multiple Chrome extensions that were either updated with malicious code or sold to operators who injected affiliate-stuffing iframes/redirects. At least one widely used utility extension was removed from the Chrome Web Store after researchers found it injecting hidden iframe requests to affiliate redirectors.

Investigations and creator-led lawsuits alleged Honey’s browser extension opened background requests/hidden tabs to load PayPal/Honey affiliate links and overwrite creators’ affiliate cookies, diverting commissions. Plaintiffs (multiple creators/publishers) filed consolidated complaints claiming intentional interference and breach of industry standards; filings and industry reporting show merchants and creators terminated partnerships after disclosures. Courts have issued mixed rulings on standing and particular claims; litigation is ongoing with amended complaints and motions.

Addressing cookie stuffing

Addressing cookie stuffing requires a combination of technical controls, program governance, and continual monitoring. Technical controls include tokenized click identifiers, server‑side click recording, stricter validation of referrer and origin data, shorter cookie lifetimes, and the use of signed or one‑time‑use tracking tokens. Governance practices include stricter affiliate onboarding, routine audits of high‑value publishers, contractual clauses prohibiting covert cookie placement, and rapid revocation or clawback policies for suspicious commissions.

Continuous monitoring should track first‑touch attribution patterns, check for affiliate conversions originating from unlikely pages or client contexts, and flag affiliates with conversion rates or lifetime values that diverge sharply from expected baselines.

Cookie stuffing is an attribution‑fraud tactic that clandestinely seeds devices with affiliate cookies to claim future conversions. Brands with large affiliate programs or high‑value transactions are particularly vulnerable, and high‑profile legal and industry cases have demonstrated both the financial scale of abuse and the regulatory and contractual remedies available to advertisers and networks. Next week we will dive into technical controls and governance practices. Stay tuned.