Malvertising attacks, which infiltrate genuine advertising networks with malicious creatives, are increasingly determining which systems are potential targets by inserting code directly into ad banners.
This practice, known as fingerprinting, allows the perpetrators behind such assaults to save time and effort by only targeting genuine web users on vulnerable systems. It also allows them to avoid detection by security researchers – prolonging the scam.
Fingerprinting is nothing new, but traditionally, attacks have waited until an exploit kit has been downloaded before performing such checks. The Angler exploit kit uses a flaw in Internet Explorer’s XMLDOM ActiveX control to do this – as seen in an assault on xHamster last year.
Researchers at Malwarebytes and GeoEdge spent several months researching and monitoring several malvertising campaigns on a number of ad networks.
Some hid code in JavaScript and GIFs – sometimes secured via HTTPS and on-the-fly encoding – and used IP addresses related to VPNs to avoid detection. All used seemingly genuine advertisement-related domains, used an intermediate redirector and targeted genuine IP addresses. Attacks even stopped using public URL-shortening services because they were too obvious.
One campaign that used Google’s DoubleClick service, which used encoded GIFs to fingerprint, checked users with IP and HTTP headers to see what security products were installed. If the user had a unique IP address, Internet Explorer 10 or earlier and had not installed certain security software, they would be targeted.
The research also found that 42 percent of all malvertising infections occurred in the US, ahead of Canada (13.7 percent) and the UK in third (11.8 percent). Experts say scammers can get 1,000 ad impressions for as little as 19 cents, using real time bidding common on many advertising networks.
A number of malvertising attacks have previously affected users of dating websites, social networks and even Forbes.com, leading many to question the safety of online advertising – especially those running Flash. Google Chrome now pauses Flash adverts by default, while Amazon has blocked assets powered by the much-maligned software. Some have even turned to controversial ad-blockers to protect themselves against such attacks.
“It is obvious to us that malvertising has become a major issue that no one has a clear answer for,” said the report, co-authored by Jerome Seguara, senior researcher at Malwarebytes, and Eugene Aseev at GeoEdge.
“One of the most important things you can do is ensure your endpoints are fully up-to-date. The number one reason malvertising attacks are successful is due to unpatched programs. After all, ads are the vehicle to an ulterior motive which consists of infecting end users with malware or serving them scam pages.
“In the wake of a particularly busy year with Flash Player vulnerabilities and zero-day exploits, it has become imperative to complement your existing security solutions with exploit mitigation tools. By the same token, a layered defense is your best bet to fend off today’s most sophisticated attacks.”
What do you know about Internet security? Find out with our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…