Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cloud
    • Cybersecurity
    • IT Management

    Malvertisements Hit 3 Million Impressions per Day at End of 2010

    By
    Fahmida Y. Rashid
    -
    March 9, 2011
    Share
    Facebook
    Twitter
    Linkedin

      The number of malicious Web advertisements jumped sharply in the fourth quarter of 2010, according to a report from security firm Dasient.

      “Malvertising,” or advertisements containing malware, was on the rise, with more than 3 million impressions per day in the fourth quarter, double what was found in the third quarter, Dasient said in its 2010 Malware Report, released Mar. 7.

      Attackers were increasingly sneaking malicious code and links to malware-laden Websites within malicious ads that legitimate advertising networks were distributing to a large number of Websites. Security experts predict that these ads would increase in 2011 as a very easy and lucrative attack vector.

      Part of the increase in Dasient’s report may be attributed to the fact that the company decided to include remnant ad networks in the survey for the first time. Remnant networks sell empty advertising slots for a low rate so that other advertising networks have another pool of ads to draw upon instead of relying on house ads to fill empty inventory, Dasient said. These third-party ad networks aggregate advertisements and generally have very low ad rates, so they are less likely to vet such advertisements carefully, the report said.

      “With the addition of more remnant ad networks in our telemetry, we believe that we are more accurately reflecting the current state of malvertsing,” the report stated.

      Malvertising can wreak havoc on unsuspecting Website visitors without going through the trouble of hacking the actual Website. Such was the case recently when visitors to the London Stock Exchange Website were hit by rogue anti-virus malware served up by a malicious ad that appeared on the site.

      As part of the research, Dasient researchers conducted several “benign” experiments to see how malware was being spread. Researchers posted an ad whose click-through links pointed to a Website that automatically triggered a drive-by-download, Dasient said. The file being downloaded was safe, the researchers said. The benign ad had the headline, “Click for a security test,” was linked to “hackerhome.org” and opened up the Windows calculator if the computer was vulnerable. Researchers said various social-networking sites kept the ad up for more than three weeks.

      Social networks are also not screening their ad landing pages with automated systems that look for drive-by downloads of malware, said Dasient.

      Firms that serve advertisements need to do a better job vetting the content of the images they distribute for malicious code and detecting Web-based attacks, including malicious ads, when they appear, said Neil Daswani, Dasient’s CTO.

      The researchers also tested how easy it was to spread malware via malicious links on social-network sites. More than 80 percent of the social-networking sites allowed links that were on Google’s Safe Browsing list to pass, and all the sites allowed links that triggered a drive-by download, the researchers said. Most social-media networks do not check links in UGC (user-generated content) such as posts and comments to determine if they contain or lead to malware threats, the report found.

      It was clear that infections could occur relatively easily via UGC interactions and advertisements, according to researchers.

      More than a million Websites were infected with malware in the fourth quarter of 2010, nearly double those of the last quarter 2009, according to the report.

      Fahmida Y. Rashid
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×