Malvertising Gets Boost From Malicious Browser Plug-ins
Cisco discovers malicious browser add-ons that serve up unwanted and sometimes infected ads.
Cisco's Talos Group has discovered malicious browser plug-ins that inject unwanted or infected ads onto certain pages an unfortunate user visits.
The attackers can thus deliver malware (via infected ads), collect user behavior data, or just get a nibble of the $200 billion online advertising market.
The browser add-ons also fingerprint the user's system, and display ads customized for different operating systems -- a PC repair ad for Windows and a gaming ad for Linux, for example. Plus, the installer circumvents Google Chrome's policy of distrusting third-party plug-ins, by manually whitelisting them.
For more details, see the Cisco threat report blog.
Read more about:
2015About the Author(s)
You May Also Like
Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024Extending Access Management: Securing Access for all Identities, Devices, and Applications
June 4, 2024Assessing Software Supply Chain Risk
June 6, 2024Preventing Attackers From Wandering Through Your Enterprise Infrastructure
June 19, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024