May 11, 2015 By Shane Schick 2 min read

Many people hate online ads because they create annoying distractions on websites, but research from Google and several universities suggest ad injectors are also a security risk.

The Google Online Security Blog outlined a new study on the ad injection economy, which was carried out by researchers at Google along with the University of California, Berkeley and the University of California, Santa Barbara. The report described a mechanism used to detect unwanted software that uncovered more than 85,000 ad injectors aimed at the Chrome browser. Besides taking control of the browser, the research suggested that 30 percent of such extensions and apps were stealing data and reporting it back to third parties. The data could include anything from browser queries to more serious information, such as online account credentials.

Although not all ad injectors are the work of cybercriminals, eWEEK pointed out that they are often distributed in ways that would categorize them as malware. This could include online campaigns that trick users into clicking on special URLs or even via ad affiliation networks, which can profit from each click that comes through such programs. Advertisers might not even realize where some of the traffic to their ads originated.

AdExchanger, an online magazine aimed at the digital marketing industry, suggested Google’s findings would raise major concerns from companies that run campaigns online. Some may already be on the alert after a recent scandal involving Superfish, whose technology for switching online ads reportedly opened up Lenovo laptop users to hacker activity.

The report showed some very well-known brands whose ads are being served up via ad injectors, including Wal-Mart, eBay and Sears. Although the main culprits may be limited to less than a handful of programs, The Wall Street Journal suggested that resolving this issue could prove highly challenging. Google and others could conceivably create tools to block unwanted ads, but it would probably be quicker if more publishers and brands became more aware of the issue and how it could hurt their customers.

The Verge made another good point: Although Google’s research suggested that 1 in 20 online users are victims of ad injectors, that may be a conservative number. Much like other forms of malware, those looking to serve up unwanted ads and steal information try to be as difficult to detect as possible. The report may have opened a can of worms, but we probably still haven’t seen the bottom of the can.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today