{"id":1336,"date":"2018-01-29T11:25:59","date_gmt":"2018-01-29T11:25:59","guid":{"rendered":"https:\/\/blog.esmt.org\/dsi\/?p=1336"},"modified":"2018-02-07T10:51:52","modified_gmt":"2018-02-07T10:51:52","slug":"malvertising-the-role-of-dynamic-content-and-ad-networks-in-the-propagation-of-malicious-code","status":"publish","type":"post","link":"https:\/\/blog.esmt.org\/dsi\/general\/malvertising-the-role-of-dynamic-content-and-ad-networks-in-the-propagation-of-malicious-code\/","title":{"rendered":"Malvertising: The role of dynamic content and ad networks in the propagation of malicious code"},"content":{"rendered":"<p lang=\"en-US\">Malvertising &#8211; that is the spreading of malware or fraudulent content through malicious ads on otherwise trustworthy homepages &#8211; is not only persistent but also growing as recent articles from Motherboard [<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8qxyy3\/another-reason-to-use-an-ad-blocker-malvertising-has-tripled-this-year\" target=\"new\">1<\/a>] and Ars Technica [<a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/01\/malvertising-factory-with-28-fake-agencies-delivered-1-billion-ads-in-2017\/\" target=\"new\">2<\/a>] suggest, both refering to a report from Cyphort as their primary source. This increase in delivery of malicious ads poses an imminent threat to users on the Internet. Ars Technica emphasises that one consortium only, consisting of 28 fake ad agencies, was able to reach 62% of ad monetized websites on a weekly basis.<!--more--><\/p>\n<p lang=\"en-US\">Some 20 years ago, it was fairly common among security-aware users to disable the processing of scripting languages such as JavaScript in their browsers to mitigate pop-ups and other annoying behaviour. Back in these days, these scripting languages on webpages hardly ever served any useful purpose. This was especially relevant for users of Microsoft&#8221;\u02dcs Internet Explorer, where &#8220;scripting&#8221; also included processing of VBScript and ActiveX, which opposed to JavaScript could access the filesystem [<a href=\"https:\/\/www.werle.com\/tipps\/js\/js1.htm\" target=\"new\">3<\/a>]. Back then, the web was fairly static and interactive and dynamic content, where JavaScript and other scripting languages play a major role, was of subordinate importance.<\/p>\n<p lang=\"en-US\">Today, dynamic provisioning of interactive content is integral to many websites in order to serve their intended purpose. Be it applications such as Google Docs or social media platforms such as Facebook and Twitter.<\/p>\n<p lang=\"en-US\">But there is another business that heavily relies on the dynamic provisioning of content, advertisement. With help of scripts deployed on popular webpages, ad networks dynamically provide content to distribute ads in a specified volume, time frame and geographical location, to name just a few criteria. Additionally, the bi-directional nature of involved communication allows ad networks to not only blindly distribute specific content per page load but also to track and target certain user groups. The two most important types of peers of such ad network operators are on the one hand those who want to have their ads displayed on preferably popular web pages and pay for it, and on the other hand those who are willing to sell suitable advertisement space on their webpage.<\/p>\n<p lang=\"en-US\">Depending on the type of ad network and respective contracting, the operator of a webpage might be unaware of the content that is delivered to a visitor upon loading the page as this is handled by the ad network. This becomes delicate when ad networks allow advertisers to deliver active content such as JavaScript and Flash themselves, that will be executed on the visitor&#8221;\u02dcs machine and might have been crafted with malicious intent. Even if such malicious code does not manage to escape the browser&#8221;\u02dcs sandbox and autonomously download and execute any malware, they might lure inexperienced users into downloading malware themselves by inserting overlays and pop-ups containing fake security alerts that claim to require immediate interaction. Such attacks are generally referred to as drive-by downloads, even if not fully automated.<\/p>\n<p><span lang=\"en-US\">This leads to scenarios in which reputable web <\/span><span lang=\"en-US\">sites<\/span><span lang=\"en-US\"> distribute malicious content without even knowing it, as happened with Forbes.com, MSN.com or Huffington Post <\/span><span lang=\"en-US\">[<a href=\"https:\/\/www.engadget.com\/2016\/01\/08\/you-say-advertising-i-say-block-that-malware\/\" target=\"new\">4<\/a>, <a href=\"https:\/\/www.scmagazine.com\/ransomware-is-being-distributed-on-huffpo-site\/article\/535680\/\" target=\"new\">5<\/a>]<\/span><span lang=\"en-US\">, <\/span><span lang=\"en-US\">for example<\/span><span lang=\"en-US\">. Assuming that an up-to-date Anti Virus software will avert the threat is a misbelief as shown in the incident with Equifax, where only three out of 65 AV Scanners detected the malware <\/span><span lang=\"en-US\">[<a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/equifax-website-hacked-again-this-time-to-redirect-to-fake-flash-update\/\" target=\"new\">6<\/a>]<\/span><span lang=\"en-US\">.<\/span><\/p>\n<p><span lang=\"en-US\">The abuse of ad networks and its implications for endpoint security are not new at all and have been brought up by media and security experts alike throughout the last decade <\/span><span lang=\"en-US\">[<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/12\/www_malware_hid.html\" target=\"new\">7<\/a>, <a href=\"https:\/\/krebsonsecurity.com\/2011\/11\/attemped-malvertising-on-krebsonsecurity-com\/\" target=\"new\">8<\/a>]<\/span>. <span lang=\"en-US\">Still, the problem <\/span><span lang=\"en-US\">is growing<\/span><span lang=\"en-US\"> bigger <\/span><span lang=\"en-US\">and<\/span> <span lang=\"en-US\">a<\/span><span lang=\"en-US\"> recap of 2017 brings lots of Ransomware attacks to mind, many of which can be and have been conducted via drive-by downloads. <\/span><span lang=\"en-US\">T<\/span><span lang=\"en-US\">he German BSI identified drive-by downloads as an important vector for the spreading of Ransomware <\/span><span lang=\"en-US\">[<a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware.pdf?__blob=publicationFile&amp;v=2\" target=\"new\">9<\/a>]<\/span><span lang=\"en-US\">.<\/span><\/p>\n<p lang=\"en-US\">So, what is the conclusion? As long as the content that is distributed via ad networks is neither restricted in type nor subject to any form of &#8220;quality&#8221; assurance, a rational user should block side-loaded content for the sake of security*. With this in mind, the attempt of some German content providers to prohibit the use of ad blockers appears to be an attack on both privacy and security of users [<a href=\"https:\/\/www.heise.de\/newsticker\/meldung\/Zeitungsverleger-Verband-will-Adblocker-verbieten-3645644.html\" target=\"new\">10<\/a>]. On the other hand, the business models of many web page operators are highly dependent on ads actually being loaded and displayed.<\/p>\n<p><span lang=\"en-US\"><i>*This, of course, does not provide any security in cases where the visited web page delivers malware itself, but it covers those cases where malware is dealt out by ad network operators.<br \/>\n<\/i><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span lang=\"en-US\">[1] <\/span><span lang=\"en-US\">(<a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/8qxyy3\/another-reason-to-use-an-ad-blocker-malvertising-has-tripled-this-year\" target=\"new\">https:\/\/motherboard.vice.com\/en_us\/article\/8qxyy3\/another-reason-to-use-an-ad-blocker-malvertising-has-tripled-this-year<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[2] <\/span><span lang=\"en-US\">(<a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/01\/malvertising-factory-with-28-fake-agencies-delivered-1-billion-ads-in-2017\/\" target=\"new\">https:\/\/arstechnica.com\/information-technology\/2018\/01\/malvertising-factory-with-28-fake-agencies-delivered-1-billion-ads-in-2017\/<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[3] (<a href=\"https:\/\/www.werle.com\/tipps\/js\/js1.htm\" target=\"new\">https:\/\/www.werle.com\/tipps\/js\/js1.htm<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[4] (<a href=\"https:\/\/www.engadget.com\/2016\/01\/08\/you-say-advertising-i-say-block-that-malware\/\" target=\"new\">https:\/\/www.engadget.com\/2016\/01\/08\/you-say-advertising-i-say-block-that-malware\/<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[5] (<a href=\"https:\/\/www.scmagazine.com\/ransomware-is-being-distributed-on-huffpo-site\/article\/535680\/\" target=\"new\">https:\/\/www.scmagazine.com\/ransomware-is-being-distributed-on-huffpo-site\/article\/535680\/<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[6] (<a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/10\/equifax-website-hacked-again-this-time-to-redirect-to-fake-flash-update\/\" target=\"new\">https:\/\/arstechnica.com\/information-technology\/2017\/10\/equifax-website-hacked-again-this-time-to-redirect-to-fake-flash-update\/<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[7] (<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/12\/www_malware_hid.html\" target=\"new\">https:\/\/www.schneier.com\/blog\/archives\/2016\/12\/www_malware_hid.html<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[8] (<a href=\"https:\/\/krebsonsecurity.com\/2011\/11\/attemped-malvertising-on-krebsonsecurity-com\/\" target=\"new\">https:\/\/krebsonsecurity.com\/2011\/11\/attemped-malvertising-on-krebsonsecurity-com\/<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[9] (<a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware.pdf?__blob=publicationFile&amp;v=2\" target=\"new\">https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Cyber-Sicherheit\/Themen\/Ransomware.pdf?__blob=publicationFile&amp;v=2<\/a>)<br \/>\n<\/span><span lang=\"en-US\">[10] (<a href=\"https:\/\/www.heise.de\/newsticker\/meldung\/Zeitungsverleger-Verband-will-Adblocker-verbieten-3645644.html\" target=\"new\">https:\/\/www.heise.de\/newsticker\/meldung\/Zeitungsverleger-Verband-will-Adblocker-verbieten-3645644.html<\/a>)<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malvertising &#8211; that is the spreading of malware or fraudulent content through malicious ads on otherwise trustworthy homepages &#8211; is not only persistent but also growing as recent articles from Motherboard [1] and Ars Technica [2] suggest, both refering to &hellip; <a href=\"https:\/\/blog.esmt.org\/dsi\/general\/malvertising-the-role-of-dynamic-content-and-ad-networks-in-the-propagation-of-malicious-code\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,1],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","hentry","category-dsi-incident-monitor","category-general"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":4,"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"predecessor-version":[{"id":1436,"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/posts\/1336\/revisions\/1436"}],"wp:attachment":[{"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.esmt.org\/dsi\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}