Lundi 30 Septembre 2024
taille du texte
   
Vendredi, 10 Décembre 2010 21:09

Google DoubleClick Caught Serving Malicious Ad

Rate this item
(0 Votes)

DoubleClick, the Google-owned ad technology, has been distributing malware in an online ad served through a number of websites, according to the security researcher who says he discovered the attack.

The malware infects users who visit a page where

an infected banner ad is displayed. It’s installed as a drive-by download, meaning that users don’t have to click on the ad to be infected, they just have to visit a website when the ad appears on the page.

Wayne Huang, CTO of Armorize, says his company discovered the problem Dec. 4 and notified DoubleClick.

The malicious advertisement, for gift cards, originates from a bogus advertising agency called AdShufffle, with three f’s in the name. The name appears to be playing off legitimate advertiser AdShuffle. The malicious ad has appeared on sites for Runnersworld.com and OrganicGardening.com, which are published by the Emmaus, Pennsylvania-based Rodale Inc. A company spokeswoman said the company would be taking down the ads.

The banner ad hawks a gift card for retail giant Target.

Huang says it appears the attackers simply copied a legitimate banner ad and inserted Javascript that exploits the user’s browser through one of three vulnerabilities. If the user has any of the unpatched vulnerabilities, a piece of software called “hdd plus” is quietly installed on their computer. The Javascript also tries to force browsers’ PDF plug-ins to open a PDF to deliver the software through an Adobe exploit.

Once a user is infected, the “hdd plus” program causes a fake Windows warning message to appear on the user’s screen indicating that their machine is riddled with malware, and urging the user to purchase a security program.

Huang says a backdoor is also installed on the user’s machines, but he says researchers are still examining it to determine what it does.

It’s not known how many machines may have been infected by the malicious ad or how man web sites have displayed it. Huang says the infections appear to have begun no earlier than Dec. 4.

Google acknowledged the issue in a statement to Threat Level and said it recently detected malware on its own through its DoubleClick Ad Exchange filter but that malware was stopped and never got served through its system to web sites. It’s not clear if the malware Armorize found is the same malware Google detected or a different attack.

“We can confirm that the DoubleClick Ad Exchange, which has automatic malware filters, independently detected several creatives containing malware, and blocked them instantly – within seconds,” a Google spokesman wrote in an e-mail. “Our security team is in touch with Armorize to help investigate and help remove any affected creatives from any other ad platforms.”

The malicious ads were discovered by an Armorize program called Hack Alert that scans web sites for malicious activity. Huang says that his researchers tested the malware against multiple anti-virus products and only 2 out of 42 vendors detected it.

It’s not the first time that DoubleClick has served up a malicious program. In 2007, a legitimate German marketer was caught serving malware through an ad. In that case, the malware caused a flood of pop-up warnings to appear on the user’s desktop telling them their machine was infected and urging them to purchase a security program.

DoubleClick said at the time that it had implemented a new security monitoring system to filter ads for malware.

Authors: Kim Zetter

to know more click here

French (Fr)English (United Kingdom)

Parmi nos clients

mobileporn