May 30, 2017 By Larry Loeb 2 min read

Malvertising is one of the biggest schemes that users have to watch out for when surfing the web, and the challenge of avoiding it may only be getting worse as scams become more sophisticated. For example, a recent Malwarebytes report revealed that RoughTed, a sophisticated malvertising campaign designed to bypass ad-blocking software, may have been active for over a year before it was first detected in March 2017.

The firm reported that visits to the malware’s domain totaled 500 million in the past three months. The U.S. and Canada were the hardest hit regions, followed by the U.K., Italy, Spain and Brazil. Researchers also discovered that Rig and Magnitude are among the most frequently delivered exploit kits (EKs).

Malvertising Leaks Through Ad Blockers

Attackers are performing redirections using dynamically created scripts to subvert ad blockers, according to the report. The script gets its data from a different URL every day, which makes URL blocking difficult. Users of Adblock Plus, uBlock Origin and AdGuard have reported malvertising getting through the blockers, the researchers said.

Although the malware drives traffic to its domains from many sources, it mainly uses rogue ads that contain embedded scripts. Since it also uses various fingerprinting techniques, RoughTed can deliver different malicious payloads depending on the victim’s configuration.

Fingerprinting for Custom Payloads

“[T]here is some aggressive fingerprinting, which I think most ad networks wouldn’t do because it’s very privacy invasive,” a Malwarebytes researcher told Bleeping Computer. The fingerprinting includes tests for browser type, operating system (OS), language settings and geolocation information. Another check scans for installed fonts in the victim system, which varies based on the victim’s OS.

A victim may be redirected to a number of targets specifically designed for his or her OS. These include tech support scam pages, download pages for Mac adware, download pages for Windows potentially unwanted programs (PUPs), rogue Chrome extensions and pay-per-install schemes that depend on the App Store or iTunes.

Users with ad-blocking software must be on guard against such a sophisticated campaign. Do not download supposed updates that come from unverified sites. Additionally, be sure to carefully check URLs to determine which sites are sending and receiving information.

More from

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

How red teaming helps safeguard the infrastructure behind AI models

4 min read - Artificial intelligence (AI) is now squarely on the frontlines of information security. However, as is often the case when the pace of technological innovation is very rapid, security often ends up being a secondary consideration. This is increasingly evident from the ad-hoc nature of many implementations, where organizations lack a clear strategy for responsible AI use.Attack surfaces aren’t just expanding due to risks and vulnerabilities in AI models themselves but also in the underlying infrastructure that supports them. Many foundation…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today