Suped

Summary

Email analytics often rely on JavaScript to accurately track user engagement, including clicks. However, various automated systems, particularly link security checkers and anti-phishing bots, interact with email links without executing JavaScript. This can lead to a discrepancy in analytics, where legitimate security scans are registered as clicks from users without JavaScript enabled, skewing engagement data.

What email marketers say

Email marketers frequently encounter challenges in distinguishing genuine user engagement from automated clicks generated by security systems. Many report seeing a significant number of immediate clicks, often attributed to 'no-JS' environments, which they suspect are from email security checkers rather than human subscribers. This phenomenon affects the accuracy of their email campaign analytics and can lead to misinterpretations of subscriber behavior and campaign performance.

Marketer view

Email marketer from Email Geeks indicates that link security checkers can indeed register as a browser not supporting JavaScript, which directly answers the initial query. This confirms the suspected source of 'no-JS' reports.

13 Jan 2023 - Email Geeks

Marketer view

Marketer from Email Geeks confirms a significant number of immediate clicks, expressing concern that many are reporting back as users without JavaScript, reinforcing the need to distinguish these from genuine engagement.

13 Jan 2023 - Email Geeks

What the experts say

Email deliverability experts highlight that while security scanners clicking links is a known phenomenon, the use of invisible or hidden links to detect these automated interactions carries potential risks. Microsoft has, in private discussions, advised against such practices, signaling potential deliverability or compliance concerns despite some senders reporting no immediate issues. This indicates a nuanced understanding is required regarding security practices and their indirect impact on email program performance and reputation.

Expert view

Expert from Email Geeks confirms that Microsoft explicitly warned against using invisible links in emails, indicating a potential risk associated with this practice despite its use for filtering bot clicks.

13 Jan 2023 - Email Geeks

Expert view

Expert from Email Geeks notes that the warning from Microsoft about invisible links came from a private discussion in early 2020. This indicates a lack of public guidance on the matter.

13 Jan 2023 - Email Geeks

What the documentation says

Official documentation and security research often detail how link security checkers operate. These systems are designed to mimic user behavior to identify phishing, malware, and other threats within emails. While their primary goal is protection, their operational methods, such as pre-fetching links or following redirects without full JavaScript execution, can inadvertently generate false 'no-JS' clicks in email analytics. Understanding these technical nuances is crucial for email senders to interpret their engagement data accurately and maintain good sending practices.

Technical article

Documentation from Keepnet Labs explains how to perform step-by-step phishing email analysis. This process often involves automated link scanning, which can result in clicks that do not execute JavaScript.

10 Apr 2024 - Keepnet Labs

Technical article

Intezer documentation details techniques threat actors use to make phishing emails look legitimate. Security systems must analyze these for malware delivery, contributing to automated link interactions.

1 Apr 2024 - Intezer

12 resources

Start improving your email deliverability today

Get started