
Malvertising (a
portmanteau
In linguistics, a blend—also known as a blend word, lexical blend, or portmanteau—is a word formed by combining the meanings, and parts of the sounds, of two or more words together. of "malicious software (
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
) advertising") is the use of
online advertising
Online advertising, also known as online marketing, Internet advertising, digital advertising or web advertising, is a form of marketing and advertising that uses the Internet to promote products and services to audiences and platform users. ...
to spread
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
.
It typically involves injecting malicious or malware-laden advertisements into legitimate
online advertising networks and
webpages.
Because advertising content can be inserted into high-profile and reputable websites, malvertising provides malefactors an opportunity to push their attacks to web users who might not otherwise see the ads, due to firewalls, more safety precautions, or the like. Malvertising is "attractive to attackers because they 'can be easily spread across a large number of legitimate websites without directly compromising those websites'."
Malvertising can be extremely hard to combat because it can quietly work its way into a webpage or webpage advertisement and spread unknowingly: "The interesting thing about infections delivered through malvertising is that it does not require any user action (like clicking) to compromise the system and it does not exploit any vulnerabilities on the website or the server it is hosted from... infections delivered through malvertising silently travel through Web page advertisements." It is able to expose millions of users to malware, even the most cautious, and is growing rapidly: "In 2012, it was estimated nearly 10 billion ad impressions were compromised by malvertising."
Attackers have a very wide reach and are able to deliver these attacks easily through advertisement networks. Companies and websites have had difficulty diminishing the number of malvertising attacks, which "suggests that this attack vector isn’t likely to disappear soon."
Overview
When websites or web publishers unknowingly incorporate corrupted or malicious advertisements into their page, computers can become infected pre-click and post-click. It is a misconception that infection only happens when visitors begin clicking on a malvertisement. "Examples of pre-click malware include being embedded in main scripts of the page or
drive-by-downloads. Malware can also auto-run, as in the case of auto redirects, where the user is automatically taken to a different site (without user interaction, such as clicking on them), which could be malicious. Malware can also be found in the delivery of an ad – where a clean ad that has no malware pre- or post-click (in its build and design) can still be infected whilst being called. Malicious code can hide undetected and the user has no idea what's coming their way. A post-click malvertisement example: "the user clicks on the ad to visit the advertised site, and instead is directly infected or redirected to a malicious site. These sites trick users into copying viruses or spyware usually disguised as Flash files, which are very popular on the web."
Redirection is often built into online advertising, and this spread of malware is often successful because users expect a redirection to happen when clicking on an advertisement. A redirection that is taking place only needs to be co-opted in order to infect a user's computer.
Malvertising affects every part of the digital advertising chain differently. From platforms to publishers, and all the way down to the end-user who may have been the victim of a malvertising attack, everyone is affected. Malvertising often involves the exploitation of trustworthy companies. Those attempting to spread malware place "clean" advertisements on trustworthy sites first in order to gain a good reputation, then they later "insert a virus or spyware in the code behind the ad, and after a mass virus infection is produced, they remove the virus", thus infecting all visitors of the site during that time period. The identities of those responsible are often hard to trace, making it hard to prevent the attacks or stop them altogether, because the "ad network infrastructure is very complex with many linked connections between ads and click-through destinations."
Some malvertisements can infect a vulnerable computer even if the user never clicks on the (normal-appearing) advertisement.
History
The first recorded sightings of malvertising were in late 2007 and early 2008. The threat was based on a vulnerability in Adobe Flash (something that has continued into the late 2010s) and affected a number of platforms including
MySpace
Myspace (formerly stylized as MySpace, currently myspace; and sometimes my␣, with an elongated Whitespace character#Substitute images, open box symbol) is a social networking service based in the United States. Launched on August 1, 2003, it w ...
, Excite and Rhapsody. In 2009, the online edition of ''
The New York Times Magazine
''The New York Times Magazine'' is an American Sunday magazine included with the Sunday edition of ''The New York Times''. It features articles longer than those typically in the newspaper and has attracted many notable contributors. The magazi ...
'' was found to be serving an ad that was part of a larger
click fraud scam that created a botnet network of malware-infected computers, nicknamed the Bahama botnet, that then went on to be used to carry out click fraud on pay per click ads all over the web. The banner feed of ''The New York Times'' was hacked for the weekend of September 11 to 14, causing some readers to see advertisements telling them their systems were infected and trying to trick them into installing
rogue security software on their computers. According to spokeswoman Diane McNulty, "The culprit approached the newspaper as a national advertiser and had provided apparently legitimate ads for a week", and the ads were switched to the virus alert malvertisement afterwards. ''The New York Times'' then suspended third-party advertisements to address the problem, and even posted advice for readers regarding this issue on its technology blog.
In 2010, malvertising took off. Marketing analysts ClickZ noted that the Online Trust Alliance (OTA) identified billions of display ads, across 3500 sites carrying malware. In the same year the Online Trust Alliance formed a cross industry Anti-Malvertising Task Force. In 2011, Spotify had a malvertising attack which used the
Blackhole exploit kit – this was one of the first instances of a
drive-by download
In computer security, a drive-by download is the unintended download of software, typically Malware, malicious software. The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being ...
, where a user does not even have to click on an ad to become infected with malware. Symantec added malvertising as a section in their Internet Security Threat Report 2013 in 2012. Symantec used scanning software across a series of websites and detected that half of them were infected with malvertising. In 2012, the ''Los Angeles Times'' was hit by a massive malvertising attack which used the Blackhole exploit kit to infect users. It was seen as part of a general campaign of malvertising to hit large news portals – this strategy carried on into subsequent years with attacks on huffingtonpost.com and ''The New York Times''. The growing intensity of malvertising continued in 2013, when a major malvertising campaign was waged against
Yahoo.com, one of the largest ad platforms with monthly visits of 6.9 billion. The malware exploit was based on the commonly used web attack,
Cross-site scripting
Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be ...
(XSS), number three in the top ten web attacks types identified by the Open Web Application Security Project (OWASP). The attack infected users' machines with the ransomware Cryptowall, a type of malware that extorts money from users by encrypting their data and placing a ransom of up to $1000 in bitcoins, to be paid in seven days, to decrypt the data. In 2014, there were major malvertising campaigns on the
DoubleClick
DoubleClick Inc. was an American advertisement company that developed and provided Internet ad serving services from 1995 until its acquisition by Google in March 2008. DoubleClick offered technology products and services that were sold primaril ...
and
Zedo ad networks. Various news portals, including ''
The Times of Israel
''The Times of Israel'' (ToI) is an Israeli multi-language online newspaper that was launched in 2012 and has since become the largest English-language Jewish and Israeli news source by audience size. It was co-founded by Israeli journalist Dav ...
'' and the ''
Hindustan Times
''Hindustan Times'' is an Indian English language, English-language daily newspaper based in Delhi. It is the flagship publication of HT Media Limited, an entity controlled by the Birla family, and is owned by Shobhana Bhartia, the daughter o ...
'', were affected. As in previous attacks the cybercrime involved Cryptowall as the malware infection. This spate of malvertising was believed to have brought over $1 million of ransom money in by infecting over 600,000 computers.
According to
McAfee
McAfee Corp. ( ), formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American proprietary software company focused on online ...
's February 2015 Threat Report, malvertising was beginning to grow quickly on mobile platforms in late 2014 and early 2015. Additionally, in 2015, there were malvertising campaigns on
eBay
eBay Inc. ( , often stylized as ebay) is an American multinational e-commerce company based in San Jose, California, that allows users to buy or view items via retail sales through online marketplaces and websites in 190 markets worldwide. ...
,
Answers.com, talktalk.co.uk, and wowhead.com, among others. The campaigns involved breaches of ad networks, including DoubleClick and engage:BDR. There was also a report of possibly the first "political malvertising" campaign by pro-Russian activists, which was based on a botnet, which then forced users' machines to visit bogus sites that generated ad revenue for the activists. The users also ended up at several pro-Russian propaganda videos.
In 2021,
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
gang REvil was spotted using paid positioning in Google search results to deliver malicious files to victims. Malvertising cash or
cryptocurrency
A cryptocurrency (colloquially crypto) is a digital currency designed to work through a computer network that is not reliant on any central authority, such as a government or bank, to uphold or maintain it.
Individual coin ownership record ...
giveaway campaigns with actors masquerading as popular figures including YouTuber
MrBeast
James Stephen "Jimmy" Donaldson (born May 7, 1998), commonly known by his online alias MrBeast, is an American YouTuber, media personality, and businessman. His YouTube videos, where he often hosts elaborate challenges and philanthropic effor ...
,
Elon Musk
Elon Reeve Musk ( ; born June 28, 1971) is a businessman. He is known for his leadership of Tesla, SpaceX, X (formerly Twitter), and the Department of Government Efficiency (DOGE). Musk has been considered the wealthiest person in th ...
, and others have been seen across many advertising platforms and social media sites. In 2022, reports surfaced of
Native advertising
Native advertising, also called sponsored content, partner content, and branded journalism, is a type of paid advertising that appears in the style and format of the content near the advertisement's placement. It manifests as a post, image, vide ...
on google search masquerading to be various software download pages (oftentimes
open source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
), leading users to instead download
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
, info stealer, or redirect them to
tech support scams
More examples of malicious advertisements
Several popular websites and news sources have been victims to malvertising and have had malicious advertisements placed on their webpages or widgets unknowingly, including Horoscope.com, ''
The New York Times
''The New York Times'' (''NYT'') is an American daily newspaper based in New York City. ''The New York Times'' covers domestic, national, and international news, and publishes opinion pieces, investigative reports, and reviews. As one of ...
'',
the
London Stock Exchange
The London Stock Exchange (LSE) is a stock exchange based in London, England. the total market value of all companies trading on the LSE stood at US$3.42 trillion. Its current premises are situated in Paternoster Square close to St Paul's Cath ...
,
Spotify
Spotify (; ) is a List of companies of Sweden, Swedish Music streaming service, audio streaming and media service provider founded on 23 April 2006 by Daniel Ek and Martin Lorentzon. , it is one of the largest providers of music streaming services ...
, and ''
The Onion
''The Onion'' is an American digital media company and newspaper organization that publishes satirical articles on international, national, and local news. The company is currently based in Chicago, but originated as a weekly print publication ...
''.
Types and modes
By visiting websites that are affected by malvertising, users are at risk of infection. There are many different methods used for injecting malicious advertisements or programs into webpages:
*
Pop-up ad
Pop-up ads or pop-ups are forms of online advertising on the World Wide Web. A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface. The pop- ...
s for deceptive downloads, such as
fake anti-virus programs that install malicious software on the computer
*
In-text or in-content advertising can have text adjusted to include malicious hyperlinks associated with content
*
Drive-by download
In computer security, a drive-by download is the unintended download of software, typically Malware, malicious software. The term "drive-by download" usually refers to a download which was authorized by a user without understanding what is being ...
s
is the activity of downloading a malicious file without a users consent as they visit a website
*
Web widgets in which redirection can be co-opted into redirecting to a malicious site
* Hidden
iframes that spread malware
*
Content delivery network
A content delivery network (CDN) or content distribution network is a geographically distributed network of proxy servers and their data centers. The goal is to provide high availability and performance ("speed") by distributing the service spat ...
s exploited to share malware
* Malicious banners on websites
* Third-party advertisements on webpages
* Third-party applications, such as forums, help desks, and
customer relationship management
Customer relationship management (CRM) is a strategic process that organizations use to manage, analyze, and improve their interactions with customers. By leveraging data-driven insights, CRM helps businesses optimize communication, enhance cus ...
and
content management system
A content management system (CMS) is computer software used to manage the creation and modification of digital content ( content management).''Managing Enterprise Content: A Unified Content Strategy''. Ann Rockley, Pamela Kostur, Steve Manning. New ...
s
* Mobile advertising through SMS promotions
Preventive measures
There are several precautions that people can take to reduce their chances of getting tricked by these advertisements. Commonly used programs such as
Adobe Flash Player
Adobe Flash Player (known in Internet Explorer, Firefox, and Google Chrome as Shockwave Flash) is a discontinuedExcept in China, where it continues to be used, as well as Harman for enterprise users. computer program for viewing multimedia ...
and
Adobe Reader
Adobe Acrobat is a family of application software and web services developed by Adobe Inc. to view, create, manipulate, print and manage Portable Document Format (PDF) files.
The family comprises Acrobat Reader (formerly Reader), Acrobat (former ...
can and have had their flaws exploited, and become vulnerable to attacks, so it should no longer be used. Users can also download anti-virus software that protects against threats and removes malicious software from their systems. Users can also push companies and websites to scan advertisements before making them active on their webpages.
Users can also use
ad blocking
Ad blocking (or ad filtering) is a software capability for blocking or altering online advertising in a History of the web browser, web browser, an Application software, application or a network. This may be done using browser extensions or othe ...
software to avoid downloading the malware contained in advertisements or a specific browser extension alerting malvertising campaigns.
See also
*
Clickjack
*
Social engineering (security)
In the context of information security, social engineering is the use of psychological influence of people into performing actions or divulging Confidentiality, confidential information. This differs from psychological manipulation in that it doe ...
*
Supply chain attack
*
Tech support scam
*
Watering hole attack
References
External links
What You Need To Know About Malvertising
{{DEFAULTSORT:Malvertising
Online advertising
Types of malware
Deception
Adware
Internet ethics