Results 1 to 1 of 1
-
29th Jun 2014, 01:31 PM #1
Rogue Ad Network Uses Flash and Silverlight Exploits
Malicious redirection scripts have been found in the Flash advertisements of a rogue ad network, which is presumably controlled by a Russian group.
As advertisements become more targeted, an increased number of users tend to click on them to check out the offer. This attack vector has not been overlooked by cybercriminals who started poisoning the ads to point the user to a malware-delivering website.
Security researchers at Malwarebytes say that the advertisement have been distributed on 123greetings.com and a website providing adult content.
By running this sort of scheme, it looks like the crooks benefit from a double stream of revenue, because they receive a commission for each user who clicks on the advertisement and get to rip off the owners of the infected computers.
Senior security researcher Jerome Segura decomposed such a piece of advertisement built with Adobe Flash and discovered that the code contained lines redirecting an unsuspecting user to a harmful location.
The website serves an exploit kit known as RIG, which takes advantage of vulnerabilities in Flash (CVE-2014-0497, CVE-2013-0634) and Silverlight (CVE-2013-0074, CVE-2013-3896).
The researcher says that the cybercriminals resorted to several methods to hide the malicious activity. First of all, there is a redirect to a safe location and there is no exploit or malicious URLs in the SWF file. Next, they make sure the system is not a debugger that can be used to analyze the code.
Another measure to avoid all suspicion is that the redirection occurs only once for each IP address; this makes reproducing the redirect more difficult.
The landing page with the RIG exploit kit seems to be hosted in the CloudFlare network and it is very likely to be shut down in order to stop further criminal activity.
As for the malware downloaded by leveraging the Flash and Silverlight vulnerabilities, Malwarebytes detects it as Trojan.Agent.ED, which could be some sort of ransomware or banking Trojan.
“This particular ad may have been placed on a number of websites, big and small and leading to several thousand infections,” said Segura.
Malwarebytes is not at its first encounter with this malvertising network, and the general recommendation is to disable ads by using software such as NoScript, a simple browser extension that can disable Flash on the visited pages.
Jerome Segura says that leveraging Flash and Silverlight flaws has seen an increase lately, and that this type of scheme is sometimes preferred instead of exploits for Java.Kepler Reviewed by Kepler on . Rogue Ad Network Uses Flash and Silverlight Exploits http://i1-news.softpedia-static.com/images/news-700/Rogue-Ad-Network-Uses-Flash-and-Silverlight-Exploits.jpg Malicious redirection scripts have been found in the Flash advertisements of a rogue ad network, which is presumably controlled by a Russian group. As advertisements become more targeted, an increased number of users tend to click on them to check out the offer. This attack vector has not been overlooked by cybercriminals who started poisoning the ads to point the user to Rating: 5
Sponsored Links
Thread Information
Users Browsing this Thread
There are currently 1 users browsing this thread. (0 members and 1 guests)
Similar Threads
-
Which ad network should i use?
By moviesprince in forum Webmasters, Money MakingReplies: 2Last Post: 5th Oct 2012, 03:06 PM -
about affiliate and ad networks
By mazzo in forum Affiliate Programs PromotionReplies: 2Last Post: 30th Aug 2012, 09:36 PM -
Which Ad Network to use in Warez Linking
By Harshadewa in forum Webmasters, Money MakingReplies: 4Last Post: 27th Jan 2012, 03:56 AM -
Ad network of warez and DDL sites
By mannNmeet in forum Webmasters, Money MakingReplies: 1Last Post: 30th Jun 2011, 03:03 PM -
What ad network to use?
By brainst0rm in forum Webmasters, Money MakingReplies: 2Last Post: 30th Dec 2010, 03:28 PM
themaCreator - create posts from...
Version 3.24 released. Open older version (or...