Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Malvertising

From Wikipedia, the free encyclopedia
Use of online advertisement or advertising to spread malware

This article needs to beupdated. Please help update this article to reflect recent events or newly available information.(November 2022)
An example of a malicious advertisement, claiming that the computer is infected

Malvertising (aportmanteau of "malicious software (malware) advertising") is the use ofonline advertising to spreadmalware.[1] It typically involves injecting malicious or malware-laden advertisements into legitimateonline advertising networks andwebpages.[2] Because advertising content can be inserted into high-profile and reputable websites, malvertising provides malefactors an opportunity to push their attacks to web users who might not otherwise see the ads, due to firewalls, more safety precautions, or the like.[3][4] Malvertising is "attractive to attackers because they 'can be easily spread across a large number of legitimate websites without directly compromising those websites'."[5]

Malvertising can be extremely hard to combat because it can quietly work its way into a webpage or webpage advertisement and spread unknowingly: "The interesting thing about infections delivered through malvertising is that it does not require any user action (like clicking) to compromise the system and it does not exploit any vulnerabilities on the website or the server it is hosted from... infections delivered through malvertising silently travel through Web page advertisements."[6] It is able to expose millions of users to malware, even the most cautious, and is growing rapidly: "In 2012, it was estimated nearly 10 billion ad impressions were compromised by malvertising."[2] Attackers have a very wide reach and are able to deliver these attacks easily through advertisement networks. Companies and websites have had difficulty diminishing the number of malvertising attacks, which "suggests that this attack vector isn’t likely to disappear soon."[5]

Overview

[edit]

When websites or web publishers unknowingly incorporate corrupted or malicious advertisements into their page, computers can become infected pre-click and post-click. It is a misconception that infection only happens when visitors begin clicking on a malvertisement. "Examples of pre-click malware include being embedded in main scripts of the page ordrive-by-downloads. Malware can also auto-run, as in the case of auto redirects, where the user is automatically taken to a different site (without user interaction, such as clicking on them), which could be malicious. Malware can also be found in the delivery of an ad – where a clean ad that has no malware pre- or post-click (in its build and design) can still be infected whilst being called.[7] Malicious code can hide undetected and the user has no idea what's coming their way. A post-click malvertisement example: "the user clicks on the ad to visit the advertised site, and instead is directly infected or redirected to a malicious site. These sites trick users into copying viruses or spyware usually disguised as Flash files, which are very popular on the web."[8]Redirection is often built into online advertising, and this spread of malware is often successful because users expect a redirection to happen when clicking on an advertisement. A redirection that is taking place only needs to be co-opted in order to infect a user's computer.[1]

Malvertising affects every part of the digital advertising chain differently. From platforms to publishers, and all the way down to the end-user who may have been the victim of a malvertising attack, everyone is affected.[9] Malvertising often involves the exploitation of trustworthy companies. Those attempting to spread malware place "clean" advertisements on trustworthy sites first in order to gain a good reputation, then they later "insert a virus or spyware in the code behind the ad, and after a mass virus infection is produced, they remove the virus", thus infecting all visitors of the site during that time period. The identities of those responsible are often hard to trace, making it hard to prevent the attacks or stop them altogether, because the "ad network infrastructure is very complex with many linked connections between ads and click-through destinations."[8]

Some malvertisements can infect a vulnerable computer even if the user never clicks on the (normal-appearing) advertisement.[10]

History

[edit]

The first recorded sightings of malvertising were in late 2007 and early 2008. The threat was based on a vulnerability in Adobe Flash (something that has continued into the late 2010s[11]) and affected a number of platforms includingMySpace, Excite and Rhapsody. In 2009, the online edition ofThe New York Times Magazine was found to be serving an ad that was part of a largerclick fraud scam that created a botnet network of malware-infected computers, nicknamed the Bahama botnet, that then went on to be used to carry out click fraud on pay per click ads all over the web. The banner feed ofThe New York Times was hacked for the weekend of September 11 to 14, causing some readers to see advertisements telling them their systems were infected and trying to trick them into installingrogue security software on their computers. According to spokeswoman Diane McNulty, "The culprit approached the newspaper as a national advertiser and had provided apparently legitimate ads for a week", and the ads were switched to the virus alert malvertisement afterwards.The New York Times then suspended third-party advertisements to address the problem, and even posted advice for readers regarding this issue on its technology blog.[12]

In 2010, malvertising took off. Marketing analysts ClickZ[13] noted that the Online Trust Alliance (OTA) identified billions of display ads, across 3500 sites carrying malware. In the same year the Online Trust Alliance[14] formed a cross industry Anti-Malvertising Task Force. In 2011, Spotify had a malvertising attack which used theBlackhole exploit kit – this was one of the first instances of adrive-by download, where a user does not even have to click on an ad to become infected with malware. Symantec added malvertising as a section in their Internet Security Threat Report 2013 in 2012.[15] Symantec used scanning software across a series of websites and detected that half of them were infected with malvertising. In 2012, theLos Angeles Times was hit by a massive malvertising attack which used the Blackhole exploit kit to infect users. It was seen as part of a general campaign of malvertising to hit large news portals – this strategy carried on into subsequent years with attacks on huffingtonpost.com andThe New York Times. The growing intensity of malvertising continued in 2013, when a major malvertising campaign was waged againstYahoo.com, one of the largest ad platforms with monthly visits of 6.9 billion. The malware exploit was based on the commonly used web attack,Cross-site scripting (XSS), number three in the top ten web attacks types identified by the Open Web Application Security Project[16] (OWASP). The attack infected users' machines with the ransomware Cryptowall, a type of malware that extorts money from users by encrypting their data and placing a ransom of up to $1000 in bitcoins, to be paid in seven days, to decrypt the data. In 2014, there were major malvertising campaigns on theDoubleClick andZedo ad networks. Various news portals, includingThe Times of Israel and theHindustan Times, were affected. As in previous attacks the cybercrime involved Cryptowall as the malware infection. This spate of malvertising was believed to have brought over $1 million of ransom money in by infecting over 600,000 computers.[17]

According toMcAfee's February 2015 Threat Report, malvertising was beginning to grow quickly on mobile platforms in late 2014 and early 2015.[18] Additionally, in 2015, there were malvertising campaigns oneBay,Answers.com, talktalk.co.uk, and wowhead.com, among others. The campaigns involved breaches of ad networks, including DoubleClick and engage:BDR. There was also a report of possibly the first "political malvertising" campaign by pro-Russian activists, which was based on a botnet, which then forced users' machines to visit bogus sites that generated ad revenue for the activists. The users also ended up at several pro-Russian propaganda videos.[19]

In 2021,ransomware gang REvil was spotted using paid positioning in Google search results to deliver malicious files to victims.[20] Malvertising cash orcryptocurrency giveaway campaigns with actors masquerading as popular figures including YouTuberMrBeast,Elon Musk, and others have been seen across many advertising platforms and social media sites.[21][22] In 2022, reports surfaced ofNative advertising on google search masquerading to be various software download pages (oftentimesopen source), leading users to instead downloadransomware, info stealer, or redirect them totech support scams[23][24][25]

More examples of malicious advertisements

[edit]

Several popular websites and news sources have been victims to malvertising and have had malicious advertisements placed on their webpages or widgets unknowingly, including Horoscope.com,The New York Times,[26] theLondon Stock Exchange,Spotify, andThe Onion.[5]

Types and modes

[edit]

By visiting websites that are affected by malvertising, users are at risk of infection. There are many different methods used for injecting malicious advertisements or programs into webpages:

Preventive measures

[edit]

There are several precautions that people can take to reduce their chances of getting tricked by these advertisements. Commonly used programs such asAdobe Flash Player andAdobe Reader can and have had their flaws exploited, and become vulnerable to attacks, so it should no longer be used. Users can also download anti-virus software that protects against threats and removes malicious software from their systems. Users can also push companies and websites to scan advertisements before making them active on their webpages.[2] Users can also usead blocking software to avoid downloading the malware contained in advertisements[32] or a specific browser extension alerting malvertising campaigns.[33]

See also

[edit]

References

[edit]
  1. ^abSalusky, William (December 6, 2007)."Malvertising". SANS ISC. RetrievedSeptember 11, 2019.
  2. ^abcde"Anti-Malvertising". Online Trust Alliance. Archived fromthe original on December 15, 2013. RetrievedSeptember 11, 2019.
  3. ^Johnson, Bobbie (September 25, 2009)."Internet companies face up to 'malvertising' threat".The Guardian. RetrievedSeptember 11, 2019.
  4. ^"The rise of malvertising and its threat to brands". Deloitte. 2009. Archived fromthe original on July 22, 2011. RetrievedSeptember 11, 2019.
  5. ^abcZeltser, Lenny (June 6, 2011)."Malvertising: Some Examples of Malicious Ad Campaigns". RetrievedSeptember 11, 2019.
  6. ^"Five-month malvertising campaign serves up silent infections".Infosecurity. Reed Exhibitions Ltd. February 12, 2013. RetrievedSeptember 11, 2019.
  7. ^Vuijsje, Eliana (August 31, 2015)."What is Malvertising (Malware) Detection in Online Advertising, Part I". Archived fromthe original on April 16, 2021. RetrievedSeptember 11, 2019.
  8. ^ab"A rising security threat: Malvertising".Bullguard. RetrievedSeptember 11, 2019.
  9. ^clean.io, Sent with 💙 by."Malvertising Resource Center | cleanAD".www.clean.io.
  10. ^Siciliano, Robert (April 8, 2014)."Business Identity Theft; Big Brand, Big Problems".Huffington Post. RetrievedSeptember 11, 2019.
  11. ^Yurieff, Kaya (July 25, 2017)."So long, Flash: Adobe will kill plug-in by 2020".CNNMoney. RetrievedSeptember 25, 2020.
  12. ^Picchi, Aimee (September 14, 2009)."Malvertising hits The New York Times".The Daily Finance. Archived fromthe original on April 21, 2016. RetrievedSeptember 11, 2019.
  13. ^Kaye, Kate (February 10, 2011)."Billions of Web Ads Carried Malware in 2010". RetrievedSeptember 11, 2019.
  14. ^"Online Trust Alliance Forms Cross-Industry Anti-Malvertising Task Force".Reuters. September 8, 2010. Archived fromthe original on March 27, 2016. RetrievedSeptember 11, 2019.
  15. ^"Symantec Internet Security Threat Report 2013"(PDF). April 2013. Archived fromthe original(PDF) on June 5, 2014. RetrievedSeptember 11, 2019.
  16. ^"Category:OWASP Top Ten Project". RetrievedSeptember 11, 2019.
  17. ^Constantin, Lucian (August 29, 2014)."CryptoWall ransomware held over 600K computers hostage, encrypted 5 billion files". RetrievedSeptember 11, 2019.
  18. ^"McAfee Labs Threats Report February 2015"(PDF). Archived fromthe original(PDF) on March 4, 2016. RetrievedSeptember 11, 2019.
  19. ^Connell, Michael; Vogler, Sarah (February 1, 2017).Russia's Approach to Cyber Warfare (1Rev) (Report).Archived from the original on April 20, 2021.
  20. ^"Ransomware gangs use SEO poisoning to infect visitors".BleepingComputer. RetrievedOctober 29, 2021.
  21. ^"Mr Beast $1000 giveaway: website scam & pop-up removal".MySpyBot. July 6, 2021. RetrievedDecember 19, 2021.
  22. ^"How to Avoid Cryptocurrency Scams".PCMAG. RetrievedDecember 19, 2021.
  23. ^"Malvertising on Google Ads is a growing problem that isn't going away".techmonitor. Claudia Glover. January 18, 2023. RetrievedFebruary 13, 2023.
  24. ^Ilascu, Ionut."Hackers push malware via Google search ads for VLC, 7-Zip, CCleaner".bleepingcomputer. RetrievedFebruary 13, 2023.
  25. ^"Google ads lead to major malvertising campaign".Malwarebytes. July 19, 2022. RetrievedFebruary 13, 2023.
  26. ^Johnson, Bobbie (September 25, 2009)."Internet companies face up to 'malvertising' threat".The Guardian. RetrievedSeptember 11, 2019.
  27. ^Jyotiyana, Priya; Maheshwari, Saurabh (2016)."A Literature Survey on Malware and Online Advertisement Hidden Hazards". In Corchado Rodriguez, Juan Manuel; Mitra, Sushmita; Thampi, Sabu M.; El-Alfy, El-Sayed (eds.).Intelligent Systems Technologies and Applications 2016. Advances in Intelligent Systems and Computing. Vol. 530. Cham: Springer International Publishing. pp. 449–460.doi:10.1007/978-3-319-47952-1_35.ISBN 978-3-319-47952-1.
  28. ^Jyotiyana, Priya; Maheshwari, Saurabh (2016)."A Literature Survey on Malware and Online Advertisement Hidden Hazards". In Corchado Rodriguez, Juan Manuel; Mitra, Sushmita; Thampi, Sabu M.; El-Alfy, El-Sayed (eds.).Intelligent Systems Technologies and Applications 2016. Advances in Intelligent Systems and Computing. Vol. 530. Cham: Springer International Publishing. pp. 449–460.doi:10.1007/978-3-319-47952-1_35.ISBN 978-3-319-47952-1.
  29. ^abcdSood, Aditya; Enbody, Richard (April 2011)."Malvertising - exploiting web advertising"(PDF).Computer Fraud and Security:11–16.ISSN 1361-3723. RetrievedSeptember 11, 2019.
  30. ^abFinley, Klint (July 26, 2010)."Report: The 3 Biggest Enterprise Website Malware Vulnerabilities".ReadWrite Enterprise. RetrievedSeptember 11, 2019.
  31. ^Jyotiyana, Priya; Maheshwari, Saurabh (2016)."A Literature Survey on Malware and Online Advertisement Hidden Hazards". In Corchado Rodriguez, Juan Manuel; Mitra, Sushmita; Thampi, Sabu M.; El-Alfy, El-Sayed (eds.).Intelligent Systems Technologies and Applications 2016. Advances in Intelligent Systems and Computing. Vol. 530. Cham: Springer International Publishing. pp. 449–460.doi:10.1007/978-3-319-47952-1_35.ISBN 978-3-319-47952-1.
  32. ^Nichols, Shaun (August 14, 2015)."You've been Drudged! Malware-squirting ads appear on websites with 100+ million visitors".The Register. RetrievedSeptember 11, 2019.
  33. ^George, Thomas (October 9, 2015)."Malvertising up 325% – Are the AdBlockers Working?".Check&Secure. Archived fromthe original on January 30, 2016. RetrievedSeptember 11, 2019.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Malvertising&oldid=1266098878"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp