Maladverts hit Microsoft and Google sites

Powered by SC Magazine
 

Backdoor programs installed on victims' computers.

Malicious hackers infected Google and Microsoft's online advertising networks last week, according to security firm Armorize.

When clicked on, the "maladvertisements" redirect users to rogue sites that exploit flaws in Adobe Reader, Java and other PC software to install backdoor programs, giving the hackers control of the victims' PCs, Armorize said.

The sites display a dialogue box informing the visitor that malware had been detected and provided a link to the HDDPlus website. This is a known fake optimisation tool which is a trojan fronting the malicious software.

Armorize said that once the visitor arrived at the site they were immediately infected so that even rebooting would not remove the warning dialogue.

This vulnerability is known, so anyone with up-to-date antivirus products should be secured.

The first attack occurred on December 5 and lasted for a few days. Google said that it had experienced some issues with the DoubleClick Ad Exchange that it uses. The company claims that the ads were identified and blocked “within seconds”.

Microsoft may have been affected more severely as several reports indicate that malicious ads were found on the LiveMail (formerly Hotmail) site.

The 'maladvertisers' used a new trick by showing their ads as being from AdShufffle – which adds an extra ‘f’ to the acceptable AdShuffle domain. Even so, it reveals a weakness that should not have been there and the ads should not have been accepted, security analysts said.

“If anyone was going to be on top of such issues, we would hope it would be Microsoft and Google,” commented Bob Tarzey, analyst and director of Quocirca. “It is not 'just one of those things'; there is a lot at stake, if the biggest web brands are not able to protect themselves, who can?

"Google and Microsoft need to take urgent action here. There is still a disproportionate underspend on web advertising, so there is lots of upside, but to tap that confidence in the web-mega brands needs to be maintained. This is especially an issue for Google, which is still very heavily reliant on revenue from click through ads.”

It seems that Google’s DoubleClick team are on the ball, however. Huang said, “We reached out to DoubleClick and in less than a few hours' time they arranged a meeting with a group of their experts on anti-malvertising and incidence response. We were very surprised and impressed with the speed that DoubleClick acted. We provided details, and DoubleClick said they were already on top of the issue.”

Mirosoft said it, too, will seek information from Armorize.

This article originally appeared at itpro.co.uk

Copyright © ITPro, Dennis Publishing


Maladverts hit Microsoft and Google sites
 
 
 
Top Stories
Meet FABACUS, Westpac's first computer
GE225 operators celebrate gold anniversary.
 
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest articles on BIT Latest Articles from BIT
Do you direct debit customers? Read this
Oct 10, 2014
Authorities have been targeting direct debit practices with iiNet and Dodo receiving formal ...
Optus expands 4G coverage
Oct 10, 2014
If you rely on an Optus phone for work you might be interested to know that there are now 200 ...
Microsoft Office is now free for some charities
Oct 10, 2014
Microsoft has announced that eligible Australian non-profit organisations and charities can now ...
Vodafone lights up 4G in Adelaide
Oct 9, 2014
Live and work in Adelaide? Vodafone has switched on its 4G network in the city and suburbs.
Next year tradies will be able to take payments using ingogo
Oct 3, 2014
Ingogo is going to provide a card payment service for Xero users.
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  25%
TOTAL VOTES: 346

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  58%
 
No
  42%
TOTAL VOTES: 144

Vote