Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Ad networks owned by Google, Microsoft serve malware
the register ^

Posted on 12/13/2010 3:34:41 PM PST by Gomez

Two of the world's biggest ad serving networks – one owned by Google and the other by Microsoft – have been caught delivering booby-trapped banner ads that infect computers with malware without any action required on the part of the end user.

The ads on Google's DoubleClick and Microsoft's rad.msn.com contained heavily obfuscated javascript in an attempt to conceal the attack, according to an analysis by web security firm Armorize. As a result, people surfing to Scout.com, MSNBC.com and other sites that relied on the ad platforms were surreptitiously attacked by malicious code that in many cases was able to install malware without any warning.

Among the titles silently thrust on marks was HDD Plus, a piece of malware that falsely claims users have serious system errors that can only be fixed by buying a premium version of the program. The tainted banner ads used code from the Eleonore and Neosploit crimeware kits to exploit at least seven previously patched vulnerabilities in applications such as Adobe Reader, Oracle's Java, and Microsoft's Internet Explorer.

The attacks are only the latest to get past gatekeepers at DoubleClick and other large networks, which are used by smaller websites to deliver ads. In September 2009 a torrent of malicious ads flooded DoubleClick, Yahoo's Right Media and FastClick, a platform owned by ValueClick. Over the past few years there have been at least half a dozen similar breaches. An ad platform is a huge advantage to malware attackers because it allows them to get their exploits in front of potentially millions of people who have no reason to believe they're under threat.

In the attack documented by Armorize, the miscreants appear to have tricked account managers with the use of ADShufffle.com, a domain that fed the malicious banners. The address was designed to look to AdShuffle.com, which regularly works with ad platforms.

“We can confirm that the DoubleClick Ad Exchange, which has automatic malware filters, independently detected several creatives containing malware, and blocked them instantly - within seconds,” a Google spokesman said in an email. “Our security team is in touch with Armorize to help investigate and help remove any affected creatives from any other ad platforms.”

The email didn't say how the tainted ads got carried on DoubleClick or how similar attacks could be prevented in the future.

A Microsoft spokeswoman said the company is investigating the report.


TOPICS: Computers/Internet
KEYWORDS: bandoubleclick; bangoogle; google
Navigation: use the links below to view more comments.
first 1-2021-23 next last
There's a widely held myth that "only people who surf porn or (enter some type of site here) get infected." This type of quote appears in many FR threads concerning malware.
1 posted on 12/13/2010 3:34:46 PM PST by Gomez
[ Post Reply | Private Reply | View Replies]

To: ShadowAce

ping


2 posted on 12/13/2010 3:35:45 PM PST by Gomez (shibboleet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

anyone know specifically where we need to avoid going to? If it is in Yahoo, are we safe from using it for e-mail?


3 posted on 12/13/2010 3:41:39 PM PST by bareford101 (For me, there is no difference in a tolerant, open mind and a cess pool. Both are open to filth.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bareford101

Use NoScript with Firefox.

Ban doubleclick, google analytics, and rad.msn.com


4 posted on 12/13/2010 3:46:27 PM PST by Rio
[ Post Reply | Private Reply | To 3 | View Replies]

To: bareford101

This is a safe search engine that I like.

http://www.startpage.com/


5 posted on 12/13/2010 3:48:20 PM PST by freedommom
[ Post Reply | Private Reply | To 3 | View Replies]

To: Gomez

Google image search gave me the mother of all viruses two weeks ago. I was searching for a picture of Queen Elizabeth on a Canadian loon dollar to prove they were part of the commonwealth.

Shut my computer down for 3 days while our IT guy tried to get it out. The worst he’s seen in years.

Thanks for nothing, Google.


6 posted on 12/13/2010 4:03:58 PM PST by sbMKE
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

I block those sites in my hosts file. Works well but makes it difficult to click on paid ads.


7 posted on 12/13/2010 4:06:03 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bareford101

“anyone know specifically where we need to avoid going to?’

yeah stay off any site that connects to the internet.

Seriously though, many major sites have had this problem. McAfee put out a stat that over 90% of infections were spread in this manner.


8 posted on 12/13/2010 4:07:42 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: bareford101

Also, don’t run as a local admin. That helps too.

Some of the anti-virus programs now run your browser in a sandbox designed to prevent this. I dont know how well they work.


9 posted on 12/13/2010 4:09:13 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: bareford101; Gomez
As a result, people surfing to Scout.com, MSNBC.com and other sites that relied on the ad platforms were surreptitiously attacked by malicious code that in many cases was able to install malware without any warning. Among the titles silently thrust on marks was HDD Plus, a piece of malware that falsely claims users have serious system errors that can only be fixed by buying a premium version of the program.

I just removed a Trojan called HDD Rescue which is similar to the one described here. I'm pissed that it may have come from MSNBC.com. The only time I go there is from FR links. I can't think of where else it might have come from, as I'm very careful online. I usually use Firefox with its addons for security, but lately that browser has been crashing on me.

10 posted on 12/13/2010 4:10:11 PM PST by Second Amendment First
[ Post Reply | Private Reply | To 3 | View Replies]

To: Gomez

I was referred to this http://www.mvps.org/winhelp2002/hosts.htm on FR and have used it for the last couple of years.

It does slow things down some but prevents you from connecting to a long list of known bad sites.

It seems to have worked well.


11 posted on 12/13/2010 4:17:03 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

Firefox with AdBlock, NoScript and FlashBlock: I haven’t seen an ad in a very long time.


12 posted on 12/13/2010 4:28:03 PM PST by Psycho_Bunny (Hail To The Fail-In-Chief)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

I got hit with this crap. What a PITA!


13 posted on 12/13/2010 4:30:49 PM PST by ozaukeemom (Is it 2012 yet?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: sbMKE
"Queen" what?

Now what that Freeper just say about Porn!

14 posted on 12/13/2010 4:31:22 PM PST by muawiyah
[ Post Reply | Private Reply | To 6 | View Replies]

To: driftdiver

Some of the malware out there now ‘installs’ to your Windows profile and puts the executable in your Start Up with the program files in (userprofile)\local settings\temp so it can get around the ‘no admin rights’ technique.


15 posted on 12/13/2010 4:31:50 PM PST by MeganC (January 20, 2013 - President Sarah Palin)
[ Post Reply | Private Reply | To 9 | View Replies]

To: MeganC

The criminals are hard at work writing new stuff every day. Someone needs to find them and shoot them.


16 posted on 12/13/2010 4:34:55 PM PST by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: driftdiver

The problem is that a lot of this stuff is being done by major corporations - like Advertising.com - and by foreign governments - like Israel has done with ‘Incredimail’.


17 posted on 12/13/2010 4:36:39 PM PST by MeganC (January 20, 2013 - President Sarah Palin)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Gomez

Tech Ping.


18 posted on 12/13/2010 4:41:58 PM PST by Sergio (An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez
Get the cow, never see an ad again. It even pinches video ads.


Ad Muncher

19 posted on 12/13/2010 4:57:08 PM PST by Malsua
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gomez

You’re right. I got hit with a damn Google Redirector trojan twice last week and I don’t do “porn sites” and “free music download sites”. The second time I picked it up, I had only been to two sites. Free Republic and the news site in question. I stopped going to the news site and I’ve been okay.


20 posted on 12/13/2010 5:51:46 PM PST by FlingWingFlyer (Merry Christmas to all of my FReeper FRiends!)
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-23 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson