From thehackernews.com
![Click Fraud Campaign](https://thehackernews.com/new-images/img/b/R29vZ2xl/AVvXsEg0ISMmB3oTVk5Qtb01SUI2TpxDZFbpyZTOTK5hYMCUS5tgb5dn10EhHhJbPjLoBda_wTtUnDMlmWsIY8RDthNYLdA2YpBA12YoGy4RBdgAtiER3oDDMMd0M_ECxap3ibFGVT5S-b_UGEj8NNaJc4mjTpAfoEk3GksSGAD-dc8iIj-4YPYcTtCxUoxp/s728-e1000/click-fraud.jpg)
Microsoft said it’s tracking an ongoing large-scale click fraud campaign targeting gamers by means of stealthily deployed browser extensions on compromised systems.
“[The] attackers monetize clicks generated by a browser node-webkit or malicious browser extension secretly installed on devices,” Microsoft Security Intelligence said in a sequence of tweets over the weekend.
The tech giant’s cybersecurity division is tracking the developing threat cluster under the name DEV-0796.