• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact
  • Cookie Policy
    • Privacy statement (CA)
    • Cookie policy (CA)
    • Privacy statement (UK)
    • Cookie policy (UK)
    • Privacy statement (US)
    • Cookie Policy (US)
    • Privacy statement (EU)
    • Cookie policy (EU)
    • Disclaimer

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • News

Beware of new attacks from malvertising groups, security firm warns

Updated on Oct 23, 2014 by Guest Authors

While there’s nothing new in malicious advertisers being used as vectors of online attacks and fraud, cyber criminals are paying more attention on malvertising as a means to perpetrate advanced persistent threats.

Researchers from security firm Invincea have found that various groups are now growing in number who resort to malvertising to intercept networks of large organizations and companies, including your favorite social networks. Although the form of attacks derive from the not so sophisticated origins, the actual attacks being launched are of higher levels and more complex to detect.

The malvertising schemes are mostly state-sponsored, meaning that from where the attacks came from, the attackers are getting their financial resources from the government, thus they are considered legitimate in that territory and could hardly be sanctioned through the court of law.

These state sponsored attacks are believed to be a form of retribution to opponent states as governments worldwide are launching massive cyber attacks against each other. They are mostly those with enough resources to carry out the attacks.

Invincea also said the attacks employed were new in that the level of aggressiveness has never been known before.

Amid war of states in the cyber space, the ones who are mostly impacted the most are the netizens who might not be fully aware of what is going on. The targets are also very specific, as opposed to indiscriminate attacks from traditional malvertising campaigns.

How does this new attack scheme work? Malvertisers lure lead users to third party sites using fraudulent schemes. First, they would manipulate an advertising network and redirect the network’s visitors to a third party site that hosts malicious ads. These kinds of sites have exploit kits and malware lurking in its corners ready to infect the computer of an unsuspecting user.

malvertising

But as stated above, the new malvertising scheme uses different techniques compared to traditional campaigns. These malvertising targets specific users based on their versions of Flash software, operating system, cookies, interest and java plugin so as to identify which sector or organization they belong.

To make their scheme look legit, these malvertisers also participate in ad bidding in order to place their malicious ads on sites that attract large volumes of visitors and clicks. The more the visitors who would potentially click on their ads, the more effective their campaign.

Why do these ads proliferate and thrive even if the sites hosting them know that they lead to malicious pages? Well, because of profit. One indication to tell a malvertisement is that it offers a product under terms that are too good to be real.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Reader Interactions

Comments

  1. Rachella Smith says

    Oct 24, 2014 at 8:11 am

    Thanks for the wonderful post about new malvertising scheme uses different techniques compared to traditional campaigns.

Footer

Review of the Waterpik Evolution and Nano Water Flosser Combo Pack

Transparent Shaving: The yoose ICE Electric Shaver Review

INKBIRD IBS-TH5 Review – Smart Thermo Hygrometer with E-Ink Display

LISEN MagSafe CD Phone Holder for Car Review

Follow TechWalls

YoutubeFacebookTwitterInstagram

Recent Posts

  • Review of the Waterpik Evolution and Nano Water Flosser Combo Pack
  • Transparent Shaving: The yoose ICE Electric Shaver Review
  • The Hidden Cost of Cryptocurrency: Bitcoin’s Energy and Water Footprint
  • Free Places To Sleep Inside Hong Kong Airport During Long Transits

Copyright © 2023 · All Rights Reserved

Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional cookies Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}