Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

12/20/2019
11:10 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Happier Holidays as Ad Threat Declines

DEVCON report finds that the number of ad-threat JavaScript attacks in the US diminished year-over-year, but what attacks there were increased in sophistication.

Security firm DEVCON has issued its 2019 Holiday Threat Reportwhich looks at the online scene occurring this year between Thanksgiving and Cyber Monday.

The report finds that the number of ad-threat JavaScript attacks in the US diminished year-over-year, but what attacks there were increased in sophistication. DEVCON uses the term "Ad Threat" to define a type of 3rd Party JavaScript exploitation that was in the advertising space and to separate it from the more general industry problem -- ad fraud.

Every third-party service that offers animated graphics, photo slideshows, chat bots, or shopping carts creates new vulnerabilities for the organizations that use them with the embedding of JavaScript.

DEVCON found that, “a dramatic decline in the volume of many simplistic ad hacks over the last year. Less advanced hackers are being shut out of the ad threat game, but the more advanced bad actors are not only becoming more stealthy in obfuscating these attacks, they have escalated the types of exploits, broadened the attack surface and they are not limiting these attacks to the ad tag scripts.”

So, what does “3rd Party JavaScript” do for an attacker? One route it enables is that bad actors are creating fake accounts with ad networks and using that company's ad tags to deliver exploits onto sites without ever needing to compromise the target company's servers.

Partner exploitation can happen when the attacker looks for third-party partners on checkout or payment pages and finds one that is easily compromised. That code is then used to gain access and collect user data as users are entering it.

Of course, an attacker can use any inherent vulnerabilities in the JavaScript itself (or the libraries that it uses) to carry out their attack.

Also, in the case of infected assets like image files, fonts or ads, JavaScript that is being delivered back and forth can be used to hide exploits. An image for an ad that has been infected with malicious script would be an example of this.

The report says that 2019 has seen malvertisers switch from almost entirely targeting mobile devices to the majority targeting desktop browsers. The desktop exploits are usually far more devastating to the victim when successful than the mobile redirects since they deliver a much more capable and malicious payload like a trojan.

Over 60% of the activity DEVCON observed over the shopping holiday came from variants of the Led Zelpdesk, Lucky Star, Avid Diva and Invisible Ink attacks. These attacks use a combination of social engineering and exploited JavaScript to steal a user's credit card information, have them download a trojan, or both.

It has been a continuing trend that malvertising activity has been down year over year. The report found .07% of ads over this time period contained malicious code in 2019, as opposed to 1.25% in 2018. There is no clear indicator of why this holiday shopping season saw so relatively few bad ads, but there are several factors that could contribute.

The report thinks that the security of the ad ecosystem may be influenced by market-based factors. If ad networks raise the standards for admitting buyers into their system, malvertisers will find it more difficult to sneak in.

It may be that the increased attention to the problem and adoption of security tools could also be dissuading cybercriminals who have previously experienced easier environments for cybercrime in this time period.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-41393
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows forgery of SSH host certificates in some situations.
CVE-2021-41394
PUBLISHED: 2021-09-18
Teleport before 4.4.11, 5.x before 5.2.4, 6.x before 6.2.12, and 7.x before 7.1.1 allows alteration of build artifacts in some situations.
CVE-2021-41395
PUBLISHED: 2021-09-18
Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.
CVE-2021-3806
PUBLISHED: 2021-09-18
A path traversal vulnerability on Pardus Software Center's "extractArchive" function could allow anyone on the same network to do a man-in-the-middle and write files on the system.
CVE-2021-41392
PUBLISHED: 2021-09-17
static/main-preload.js in Boost Note through 0.22.0 allows remote command execution. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which invokes the dangerous openExternal Electron API.