Feeds

DoubleClick caught supplying malware-tainted ads

'Your PC is hosed. Click here to fix'

SANS - Survey on application security programs

Updated DoubleClick, the massive internet advertising platform that recently agreed to be bought by Google, has been caught serving rogue ads designed to trick users into buying unneeded software, according to an article on eWeek.

The maliciously crafted ads originated with an outfit known as AdTraff.com. After holding itself out as a legitimate online advertiser, AdTraff tricked name-brand websites including CNN, The Economist, The Huffington Post and the official site of the Philadelphia Phillies baseball team to sign contracts to run ads, according to a DoubleClick manager. The publishers at these sites then uploaded the ad files to DoubleClick servers, which distributed the banners to end users.

The ads contain encrypted links to malicious code that causes authentic-looking security warnings to be displayed on an end user's computer in an attempt to dupe the person into buying software that will fix the problem.

Sean Harvey, a senior product manager for DoubleClick, said the company is working hard to prevent its servers from serving such ads in the future. In the past three months, engineers have deployed a monitor that inspects every ad in DoubleClick's database in real time.

"We are running a constant scanning process on our system and we regularly find stuff that doesn't get turned on because we find problems," he told The Register. "Because you're putting it into the DoubleClick system, we feel it's our responsibility to run 24-hour scans for malware or malicious links."

eWeek's report comes less than a week after a researcher for SecureWorks warned that thousands of PC users had been duped by anti-spyware ads that had appeared on hundreds of websites in recent weeks.

Malicious code hardwired into the ads prompted a pop-up that warned of a bogus security threat on the visitor's machine. It offered to fix the problem in exchange for as much as $80. The ad then attempted to install software on the victim's machine that is difficult to remove.

Jackson said Monday that malicious ads are continuing to be served on high-trafficked websites, which he declined to identify by name.

The rogue ads were served by DoubleClick as recently as Sunday, according to eWeek, which cited researchers from Sunbelt Software. The publication said the malware being pushed is a variant of WinFixer, a piece of malware that poses as a diagnostic tool. It provides a fake alert that tricks people into spending money on software to fix the problems.

In addition to stepping up monitoring of the ads it serves, DoubleClick is also calling on publishers to take steps to prevent malicious ads from being served to end users. Web sites need to carry out more due diligence when approached by unfamiliar advertisers, and they also need to vet ads for suspicious code and links before uploading them to DoubleClick servers, Harvey said. He called rogue ads "an industry-wide challenge."

Indeed, the scams described by eWeek and SecureWorks are the latest to piggyback on banner ads that are fed to popular destinations. Other networks that have distributed toxic banners include Real Media and the Yahoo!-owned Right Media. Ad networks are ideal carriers for malicious payloads because of their massive reach and because they catch people as they surf to sites they know and trust.

On Monday, website marketing pros flooded industry email lists with reports of reader complaints who said they have been receiving inappropriate ads. The pros said ad servers for sites including The Wall Street Journal, Discovery and BizJournals had been hijacked, according to eWeek.

In addition to AdTraff.com, Jackson named at least three other outfits he believes have also fed malicious ads to large sites in recent weeks. They include ForceUp, BlessedAds and Traveltray.

Many of the groups have overlapping executives and pose as legitimate ad networks that are interested in buying ad space from large websites, said Jackson, who added that their combined reach has been substantial.

Said Jackson: "They managed to buy a lot of ad space". ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.