Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/18/2009
10:32 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Microsoft Steps Up To Squash Malicious Advertising Threat

While the move by Microsoft to file five civil lawsuits to help fight malicious online advertisers, the winning bet is probably not going to be on this having a big impact on malicious advertising any time soon. There's just too much money being made.

While the move by Microsoft to file five civil lawsuits to help fight malicious online advertisers, the winning bet is probably not going to be on this having a big impact on malicious advertising any time soon. There's just too much money being made.From Thomas Claburn's report Microsoft Files Five Lawsuits To Halt Malicious Advertising:

Microsoft (NSDQ: MSFT) on Tuesday filed five civil lawsuits in Seattle's King County Superior Court to combat malicious online advertising, or malvertising.

The lawsuits allege that an unknown number of individuals using various business names distributed malicious software through Microsoft AdManager, the company's online advertising platform.

"These ads then lead to harmful or deceptive content," said Microsoft associate general counsel Tim Cranton, in a blog post. "For example, ads may redirect users to a Web site that advertises rogue security software, also known as scareware, that falsely claims to detect or prevent threats on the computer."

This isn't the first time Microsoft has gone after organizations for allegedly spewing scourge. In fact, in December 2003 Microsoft sued a number of organizations for violations of consumer protection laws in New York and Washington. The spammers were accused of using forged sender names, false subject lines, fake server names, inaccurate and misrepresented sender addresses, or obscured transmission paths.

All of that is still happening today, and probably in much larger numbers than in 2003. Spam has continued to grow because it's profitable. Hard as it is to believe, people, somewhere, are responding to it and they're buying stuff. If they didn't, spam would stop.

And malicious ads that sell so-called scareware is big money. In our post, XP Security 'Scareware' Scams Skyrocketing, from a year ago, we noted that hundreds of thousands of copies of scareware were being sold within days.

More recently, anti-virus maker Panda Security researchers Luis Corrons and Sean-Paul Correll published a study, The Business of Rogueware [.pdf], that estimated online fraudsters are hauling about 34 million a month through such scareware attacks.

So while it's welcomed news, and will no doubt create a level of hassle for some purveyors of malicous advertising and scareware, these cretins will do what they always do -- and that's move their operations out of the reach of US and Western international laws.

Still, this legal move is good news. It makes it clear that these types of scams won't be tolerated, and lawsuits and hopefully prosecutions will be filed whenever possible. And, just like the battle against spam, more people will probably employ technology to help. In this case, the use of ad-blocking software.

Which brings us to one of Microsoft's likely motivations behind this action: a bigger part of their business going forward will rely on online advertising -- and Web users blocking and ignoring advertisements, because they fear scams or malware, just won't be good for business.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34812
PUBLISHED: 2021-06-18
Use of hard-coded credentials vulnerability in php component in Synology Calendar before 2.4.0-0761 allows remote attackers to obtain sensitive information via unspecified vectors.
CVE-2021-34808
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in cgi component in Synology Media Server before 1.8.3-2881 allows remote attackers to access intranet resources via unspecified vectors.
CVE-2021-34809
PUBLISHED: 2021-06-18
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34810
PUBLISHED: 2021-06-18
Improper privilege management vulnerability in cgi component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34811
PUBLISHED: 2021-06-18
Server-Side Request Forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to access intranet resources via unspecified vectors.