Categories: Cyber Security News

U.S. Sues Google for Dominance Over Digital Advertising Technologies

Recently, the US Justice Department along with the eight states filed a lawsuit against Google, accusing the company of having a monopoly on the online advertising market, which they argue harms advertisers, consumers, and even the US government. 

They claim that Google has breached Sections 1 and 2 of the Sherman Act. While the goal of the suit is to break up Google’s control of the online advertising ecosystem. 

Here below we have mentioned other eight states that participated with the US Justice Department:-

  • California
  • Colorado
  • Connecticut
  • New Jersey
  • New York
  • Rhode Island
  • Tennessee
  • Virginia

It is alleged that Google is taking significant steps silently to eliminate competition in the online advertising space through several key acquisitions. In short, making it is challenging for advertisers to use other alternatives to its products.

The US economy relies heavily on free and fair markets, and monopolies threaten the foundations of these markets. This is a situation that limits innovation, hurts workers and producers, and increases consumer costs.

Google’s Dominance Over Digital Advertising

For over a decade, Google has allegedly engaged in actions that inhibit the growth of competing technologies and influenced the workings of online advertising auctions, thereby coercing advertisers and publishers to utilize its platforms.

This lawsuit alleges that the company has unfairly monopolized the way ads are served online by excluding competitors as part of its unfair business practices.

It has now become common practice for Google to control the digital tool that nearly all major website publishers use to sell advertisements on their sites or to monetize their sites.

Google’s revenue comes primarily from its digital ads, and in terms of revenue, Google is currently generating just over 80% of its revenue from digital ads.

Google’s Anticompetitive Conduct

The following are some of the anti-competitive practices that Google has been engaging in:-

  • Acquiring Competitors
  • Forcing Adoption of Google’s Tools
  • Distorting Auction Competition
  • Auction Manipulation

Publishers, advertisers, and competitors have been hindered in their adoption of alternative technologies as a result of Google’s anticompetitive practices.

The Sherman Act, a cornerstone of American antitrust legislation, has been staunchly upheld for over a century as a means to maintain a fair and open marketplace. 

This Act serves as a reminder of the dedication to economic freedom and fair competition, as the Department of Justice continues to enforce it against monopolistic practices to promote healthy competition.

The Department has filed a civil antitrust complaint asserting an antitrust violation under the Sherman Act for the first time in approximately half a century in a monopolization case.

The Department of Justice is taking action to address Google’s alleged monopolistic behavior. This includes not only seeking restitution for the American public but also seeking triple damages for any financial losses suffered by government agencies as a result of overpaying for web display advertising.

Network Security Checklist – Download Free E-Book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network infrastructure…

9 hours ago

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted on…

9 hours ago

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into unsuspecting…

10 hours ago

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network edge…

11 hours ago

Criminal IP to Showcase Advanced Threat Intelligence at RSAC™ 2025

Joining Criminal IP at Booth S-634 | South Expo, Moscone Center | April 28 –…

11 hours ago

TP-Link Router Vulnerabilities Allow Attackers to Execute Malicious SQL Commands

Cybersecurity researchers have uncovered critical SQL injection vulnerabilities in four TP-Link router models, enabling attackers…

12 hours ago