Menu
Google's push to encrypt ads will improve security, but won't kill malvertising

Google's push to encrypt ads will improve security, but won't kill malvertising

The move might encourage more websites to deploy HTTPS

Google plans to serve most of its ads over encrypted HTTPS connections by the end of June, a move that will protect against some ad hijacking attacks and will encourage website owners to enable encryption on their Web properties.

However, malicious advertising attacks that direct users to Web-based exploits will still be possible and, because of the new encryption, it will be harder for security researchers to pinpoint their source.

Last year, Google announced that it will give more weight to HTTPS-enabled websites in search rankings in order to encourage the adoption of encryption across the Web. HTTPS (HTTP Secure) allows Web communication over a channel encrypted with the TLS (Transport Layer Security) protocol.

One of its main benefits is that it prevents the traffic from being read or modified by someone in a position to intercept it -- hackers in control of a router or prowling inside an insecure wireless network, rogue ISP employees, or a government agency spying on the Internet backbone.

A big problem webmasters have with implementing HTTPS is not the cost of buying digital certificates, but the fact that their websites load resources -- primarily advertisements -- from third parties that don't serve them over HTTPS. Loading non-encrypted resources into HTTPS websites will lead to mixed content warnings in browsers and cancels the security benefits of enabling HTTPS in the first place.

In this context, Google's efforts to start encrypting ad traffic will make transitioning to HTTPS easier for many websites, therefore increasing overall privacy and security on the Web.

By June 30 of this year, Google will encrypt "the vast majority" of mobile, video, and desktop display ads served to the Google Display Network, AdMob, and DoubleClick publishers, the company said Friday in a blog post. By this date, advertisers using any of Google's buying platforms, including AdWords and DoubleClick, will also be able to serve "HTTPS-encrypted display ads to all HTTPS-enabled inventory."

Encrypting advertising traffic for mobile devices will protect against some man-in-the-middle attacks that researchers have warned about for years, where attackers could inject rogue code into advertising traffic to abuse the permissions of the apps displaying the ads.

It will also protect against ad injection attacks done at the network layer, for example, through compromised routers. However, it won't prevent locally installed adware programs like Superfish or malware threats from displaying rogue ads on HTTPS websites opened in the local browser.

Of course, in order for encryption to have a truly large scale impact, the entire online advertising industry needs to join in the effort.

According to the Interactive Advertising Bureau (IAB), a large advertising industry association, almost 80 percent of its members' ad delivery platforms support HTTPS. However, support and actual use are two different things. For ads to be delivered to a website over HTTPS, it's not enough for the site's primary ad server to support encryption. There's a lot that needs to happen in the complicated advertising supply chain as well.

"That ad server will sometimes need to include tags from brand safety, audience and viewability measurement, and other tools -- all of which also need to support encryption," explained IAB's Director of Technical Standards Brendan Riordan-Butterworth in a blog post in March.

The publisher's ad server will often direct to one of several agency ad servers, each of those will also need to serve over HTTPS. "Each agency ad server also may include a variety of beacons or tags, depending on how the deal was set up, all of which similarly need to have encrypted versions available," he wrote.

And simply encrypting the traffic won't stop malvertising attacks, which pose the biggest risk to users. These are attacks where criminals manage to push rogue ads onto an advertising network so that when those ads are displayed on popular websites they redirect users' browsers to servers hosting exploits. If successful, those exploits install malware programs on their computers.

Google had to deal with at least two malvertising attacks on its DoubleClick network over the past two weeks. In one of those cases, researchers from Dutch security firm Fox-IT tracked the malicious ads to a Bulgarian reseller of Google advertising services whose systems they believe were compromised.

Even if that reseller would have served ads over HTTPS, it wouldn't have prevented attackers with access to its ad platform from pushing malicious advertisements onto Google's network, said Fox-IT researcher Maarten van Dantzig Monday. Moreover, if the ad traffic had been encrypted, Fox-IT wouldn't have been able to pinpoint the offending ad campaign and track it down to the Bulgarian company, he said.

While the researcher agreed that Google's decision to encrypt ad traffic is generally good for everyone's security and privacy -- the whole Web should be encrypted, he said -- the move does have drawbacks; for one, it decreases the visibility of network defenders.

For example, a network security appliance won't be able to detect and block malicious code hidden inside encrypted advertising traffic unless the device is configured to also act as an HTTPS interception proxy -- decrypting and re-encrypting traffic with a self-signed CA certificate deployed on all endpoints. Many companies don't yet have such a set-up.

Malicious advertisements typically redirect browsers to Web-based exploits hosted on non-HTTPS servers, so network appliances might actually be able to detect and block the exploits themselves. However, researchers or network security analysts investigating such incidents will not be able to see which specific ad triggered it.

With less visibility for security researchers, advertising networks will need to identify the rogue ads on their own, van Dantzig said.

He wasn't sure if many of them are ready to do that.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Interactive Advertising BureauFox-ITonline safetyGooglesecurityencryptionmalwareprivacy

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments