May 11, 2015 By Shane Schick 2 min read

Many people hate online ads because they create annoying distractions on websites, but research from Google and several universities suggest ad injectors are also a security risk.

The Google Online Security Blog outlined a new study on the ad injection economy, which was carried out by researchers at Google along with the University of California, Berkeley and the University of California, Santa Barbara. The report described a mechanism used to detect unwanted software that uncovered more than 85,000 ad injectors aimed at the Chrome browser. Besides taking control of the browser, the research suggested that 30 percent of such extensions and apps were stealing data and reporting it back to third parties. The data could include anything from browser queries to more serious information, such as online account credentials.

Although not all ad injectors are the work of cybercriminals, eWEEK pointed out that they are often distributed in ways that would categorize them as malware. This could include online campaigns that trick users into clicking on special URLs or even via ad affiliation networks, which can profit from each click that comes through such programs. Advertisers might not even realize where some of the traffic to their ads originated.

AdExchanger, an online magazine aimed at the digital marketing industry, suggested Google’s findings would raise major concerns from companies that run campaigns online. Some may already be on the alert after a recent scandal involving Superfish, whose technology for switching online ads reportedly opened up Lenovo laptop users to hacker activity.

The report showed some very well-known brands whose ads are being served up via ad injectors, including Wal-Mart, eBay and Sears. Although the main culprits may be limited to less than a handful of programs, The Wall Street Journal suggested that resolving this issue could prove highly challenging. Google and others could conceivably create tools to block unwanted ads, but it would probably be quicker if more publishers and brands became more aware of the issue and how it could hurt their customers.

The Verge made another good point: Although Google’s research suggested that 1 in 20 online users are victims of ad injectors, that may be a conservative number. Much like other forms of malware, those looking to serve up unwanted ads and steal information try to be as difficult to detect as possible. The report may have opened a can of worms, but we probably still haven’t seen the bottom of the can.

More from

Regulatory harmonization in OT-critical infrastructure faces hurdles

3 min read - In an effort to enhance cyber resilience across critical infrastructure, the Office of the National Cyber Director (ONCD) has recently released a summary of feedback from its 2023 Cybersecurity Regulatory Harmonization Request for Information (RFI). The responses reveal major concerns from critical infrastructure industries related to operational technology (OT), such as energy, transport and manufacturing. Their worries include the current fragmented regulatory landscape and difficulty adapting to new cyber regulations. The frustration appears to be unanimous. Meanwhile, the magnitude of…

Generative AI security requires a solid framework

4 min read - How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny.The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM Institute for Business Value, 96% of executives say adopting generative AI makes a security breach likely in their organization within the next three years.CISA Director Jen…

Q&A with Valentina Palmiotti, aka chompie

4 min read - The Pwn2Own computer hacking contest has been around since 2007, and during that time, there has never been a female to score a full win — until now.This milestone was reached at Pwn2Own 2024 in Vancouver, where two women, Valentina Palmiotti and Emma Kirkpatrick, each secured full wins by exploiting kernel vulnerabilities in Microsoft Windows 11. Prior to this year, only Amy Burnett and Alisa Esage had competed in the contest's 17-year history, with Esage achieving a partial win in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today