According to the blog of Chinese cybersecurity company Netlab 360, this motley bunch of cretins has been operating for quite some time. In the summer of 2017, the company was found to be generating random domain addresses in order to bypass popular adblockers. Popad had been using Domain Generation Algorithms (DGAs), which are programs that automatically register tons of seemingly nonsensical domains in order to keep one step ahead of adblockers which deny specific domain names. It's a simple but often effective way to get around blocking. A GitHub page lists all of these nonsensical ads: aaeqlxdgx.bid, zzwzjidz.bid, rxczemggfsxx.com and so on.
Thankfully, the network was only used by a few low-traffic websites (Not us - Ed) so the masses were perhaps less likely to be exploited in this way. However, Popad's rather easy way of deploying these technologies suggests two things. The first is that pretty much anyone can do it. The second is that, perhaps like Bittorrent, there will be more, er, legitimate ways in the future in which this business model can be exploited. Could you be given Nectar points, for example, by mining them through your computer's CPU, as long as Nectar promises a given CPU usage ceiling below 100%?
Perhaps the most troublesome point to make about this affair was thast some of Popad's dodgy sites received an Alexa rating of 2000.