light bulb

Did You Know?



Reply
Posts: 879
Topics: 176
Kudos: 552
Registered: ‎10-03-2012

Malvertising up by over 200%

Malvertising up by over 200%

by net-security.org

 

Online Trust Alliance (OTA) Executive Director and President Craig Spiezle testified today before the U.S. Senate’s Homeland Security and Governmental Affairs Permanent Subcommittee on Investigations, outlining the risks of malicious advertising, and possible solutions to stem the rising tide. 

 

wk

                                                                                                       

                                                                                                       Source: www.net-security.org

 

According to OTA research, malvertising increased by over 200% in 2013 to over 209,000 incidents, generating over 12.4 billion malicious ad impressions. The threats are significant, warns the Seattle-based non-profit—with the majority of malicious ads infecting users’ computers via “drive by downloads”, which occur when a user innocently visits a web site, with no interaction or clicking required. The consequences of malvertising include cybercriminals capturing users’ personal information or turning devices into a bot for the purpose of taking over that device and using it in many cases to execute DDoS attacks against a bank, government agency or other organization. Just as damaging is the deployment of ransomware, which encrypts a user’s hard drive, demanding an extortion payment to be unlocked. Users’ personal data, family photos and health records can be destroyed and stolen in seconds.

 

Full Article

Sr. Community Leader

Beta Tester



WEBROOT® SecureAnywhere™ Internet Security Complete Beta v8.0.8.53

Posts: 3,143
Topics: 1,920
Kudos: 2,233
Blog Posts: 0
Registered: ‎06-02-2014

Re: Malvertising up by over 200%

The following is a updated article on Malvertising

 

  " Quote" RIG Exploit Kit Used in Flash-Based Malvertising Campaig

 

By Eduard Kovacs on June 27, 2014
 

Flash-based ads are being used by an advertising network to lure the visitors of various websites to a landing page that has been set up to distribute malware, Internet security firm Malwarebytes said on Thursday.

According to the company, the malicious advertising (malvertising) campaign relies on ads created with Adobe Flash that have appeared on a popular adult website and on a site that offers free e-cards. A close analysis of the ad's source code revealed that it was designed to trigger a malicious redirection when loaded by creating an iframe for a URL that's on the same domain as the advertising server.

The landing page hosts the RIG exploit kit, which attempts to exploit Adobe Flash and Microsoft Silverlight vulnerabilities in order to push a piece of malware identified as Trojan.Agent.ED, Malwarebytes said.

 

SecurityWeek/ Full Read Here/ http://www.securityweek.com/rig-exploit-kit-used-flash-based-malvertising-campaign

 

Community Leader