Share

Related Links

  • Armorize
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Related Stories

Top 5 Stories

News

Drive-by scareware malvertisements served up by major ad networks

13 December 2010

It seems that the cybercriminal gangs behind the malware distribution networks are now tapping into the power of major ad-farming networks on the internet.

According to Wayne Huang, founder and CEO of California-based Armorize Technologies, the attacks started on December 3, since when they were picked up by his company's HackAlert cloud-based malware scanning service.

The HackAlert service, says Armorize's CEO, is being used by a number of clients, including VeriSign Trust Services, now part of Symantec, for its daily Trust Seal malware scans.

And when several high-profile websites started being tagged as infected, Armorize was asked to check its platform for possible bugs, he said, adding that the investigation revealed that sites like realestate.msn.com, msnbc.com and mail.live.com, were indeed inadvertently infecting their visitors with malware.

Huang says that cybercriminals appear to have registered a domain called ADShufffle.com – with three fff's, Infosecurity notes – and posed as a legitimate advertising company of the same name.

What appears more worrying is that the hackers managed to get their domain accepted on the DoubleClick ad network, operated by Google, as well as rad.msn.com, the Microsoft-owned platform that serves up adverts to Hotmail, MSN and other popular web portals/services.

The good news is that, as soon as Armorize contacted DoubleClick, they responded in a couple of hours to arrange a meeting with a group of their experts on anti-malvertising and incidence response.

"We were very surprised and impressed with the speed that DoubleClick acted. We provided details, and DoubleClick said they were already on top of the issue", he said in his security blog.

In parallel with the contact with DoubleClick, Armorize's CEO Caleb Sima received a private email indicating that mail.live.msn, together with a number of other major websites, were serving up drive-by downloads using malvertising.

"We started to investigate other ad exchanges, because it was apparent that ADShufffle.com was able to trick multiple ad exchanges into serving their malicious javascript. We started to investigate this", he said, adding that Sima and his team confirmed that ADShufffle.com was serving up malvertising through rad.msn.com.

Exploits used on the malvertising, he explained, included Java web start CLI injections, Microsoft MDAC RDS.Dataspace ActiveX and various Adobe security flaw subversions.

Commenting on the revelations, Lucian Constantin of Softpedia said that the rogue ads served from the domains were not regular scareware advertisements that falsely claim visitors are infected and offer them a program to fix it.

"They looked harmless, but loaded the Eleonore drive-by download toolkit in the background" he said, adding that the toolkit silently exploits vulnerabilities in outdated versions of popular applications like Java, Adobe Reader, Internet Explorer and even Windows.

This article is featured in:
Internet and Network Security  •  Malware and Hardware Security

 

Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×