Menu
Malicious advertisements distributed by DoubleClick, Zedo networks

Malicious advertisements distributed by DoubleClick, Zedo networks

The advertisements redirect victims to the Nuclear exploit kit, which tries to install the Zemot malware

A diagram from Malwarebytes showing what happens when a user views a malicious advertisement, resulting in the installation of the Zemot malware.

A diagram from Malwarebytes showing what happens when a user views a malicious advertisement, resulting in the installation of the Zemot malware.

Two online advertising networks, Google's DoubleClick and Zedo, have been delivering malicious advertisements that could install malware on a person's computer, according to the security vendor Malwarebytes.

The Times of Israel, The Jerusalem Post and the Last.fm music services were among the websites serving the malicious advertisements, wrote Jerome Segura, a senior security researcher with Malwarebytes, in a blog post.

"We rarely see attacks on a large scale like this," he wrote.

Although ad networks try to filter out malicious ones, occasionally bad ones slip in, which on a high-traffic site means a large pool of potential victims. Websites that serve the ads are usually unaware of the problem.

"What is important to remember is that legitimate websites entangled in this malvertising chain are not infected," Segura wrote. "The problem comes from the ad network agency itself."

DoubleClick and Zedo officials couldn't immediately be reached for comment.

Segura wrote that the ads direct victims to sites hosting the "Nuclear" exploit kit, which attempts to see if a computer is running vulnerable versions of Adobe Systems' Flash program or Internet Explorer, among others.

A successful attack will install the "Zemot" malware, which can connect to a remote server and download other malicious applications.

Segura wrote that Malwarebytes is still investigating, but that the company had warned The Times of Israel.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags malwareMalwarebytes

Featured

Slideshows

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

EDGE 2018: Kiwis kick back with Super Rugby before NZ session

New Zealanders kick-started EDGE 2018 with a bout of Super Rugby before a dedicated New Zealand session, in front of more than 50 partners, vendors and distributors on Hamilton Island.‚Äč

EDGE 2018: Kiwis kick back with Super Rugby before NZ session
EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018: Kiwis assess key customer priorities through NZ research

EDGE 2018 kicked off with a dedicated New Zealand track, highlighting the key customer priorities across the local market, in association with Dell EMC. Delivered through EDGE Research - leveraging Kiwi data through Tech Research Asia - more than 50 partners, vendors and distributors combined during an interactive session to assess the changing spending patterns of the end-user and the subsequent impact to the channel.

EDGE 2018: Kiwis assess key customer priorities through NZ research
Show Comments