Menu
Over 10 million Web surfers possibly exposed to malvertising

Over 10 million Web surfers possibly exposed to malvertising

The online advertising company that distributed the ads is taking action to stop it

A large malvertising campaign may have exposed up to 10 million people with malware, according to security firm Cyphort.

A large malvertising campaign may have exposed up to 10 million people with malware, according to security firm Cyphort.

Upwards of 10 million people may have visited websites carrying malicious advertisements in the last ten days, possibly infecting their computers with malware, according to computer security company Cyphort.

For the past month, Cyphort has been tracking various malicious advertisement campaigns, which involve duping online advertising providers into distributing their malicious ads.

If someone views a malicious advertisement, it can cause their browser to be automatically redirected to another website that attacks their computer.

Nick Bilogorskiy, director of security research at Cyphort, wrote that the company has discovered over the last week a number of highly trafficked websites that are still carrying malicious ads.

The malicious ads redirected people to websites that were rigged with the Angler exploit kit. An exploit kit is a software package that probes a computer for software vulnerabilities in order to deliver malware.

As with previous attacks observed by Cyphort, the redirection code planted in the malicious advertisements uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) encryption, which makes it harder for researchers to figure how users are bounced from the original web page they were viewing to one hosting an exploit kit.

The malicious ads were delivered to the website publishers by an online marketing company called E-planning. Bilogorskiy wrote that Cyphort had contacted the company, which was working to fix the problem.

Online advertising agencies have been battling to keep miscreants out of their networks, but it's a hard fight. Even if an ad network scans submitted ads for malicious behavior, hackers often substitute the ads with different ones at a later time or rig the ads to pass initial security checks.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags internetadvertisingCyphortE-planning

Featured

Slideshows

Malwarebytes shoots the breeze with channel, prospects

Malwarebytes shoots the breeze with channel, prospects

A Kumeu, Auckland, winery was the venue for a Malwarebytes event for partner and prospect MSPs - with some straight shooting on the side. The half-day getaway, which featured an archery competition, lunch and wine-tasting aimed at bringing Malwarebytes' local New Zealand and top and prospective MSP partners together to celebrate recent local successes, and discuss the current state of malware in New Zealand. This was also a unique opportunity for local MSPs to learn about how they can get the most out of Malwarebytes' MSP program and offering, as more Kiwi businesses are targeted by malware.

Malwarebytes shoots the breeze with channel, prospects
EDGE 2019: Channel forges new partnerships during evening networking

EDGE 2019: Channel forges new partnerships during evening networking

Partners, vendors and distributors reconnected during a number of social gatherings during EDGE 2019. The first evening saw the channel congregate for a welcome party at the Hamilton Island yacht club, while the main poolside proved to be the perfect stop for a barbecue on the final night.

EDGE 2019: Channel forges new partnerships during evening networking
Show Comments