Lucian Constantin
CSO Senior Writer

Large-scale Google malvertising campaign hits users with exploits

news
Apr 8, 20152 mins

Malvertising has been a growing problem for years

A large number of ads distributed by a Google advertising partner redirected users to Web-based exploits that attempted to install malware on users’ computers.

Security researchers from Dutch security firm Fox-IT observed the malvertising campaign Tuesday, when ads coming through a Google partner in Bulgaria called Engage Lab started redirecting users to the Nuclear Exploit Kit.

Exploit kits are Web-based attack platforms that try to exploit vulnerabilities in browsers and browser plug-ins in order to infect users’ computers with malware. The Nuclear Exploit Kit specifically targets vulnerabilities in Adobe Flash Player, Oracle Java, and Microsoft Silverlight.

“It appears as if all of engagelab.com, its advertisement and zone ID’s, are currently redirecting to a domain, which in turn is redirecting to the Nuclear Exploit Kit, indicating a possible compromise at this reseller of Google advertisement services,” Fox-IT researcher Maarten van Dantzig said Tuesday in a blog post.

The rogue redirects stopped later in the day, suggesting that either Google or Engage Lab took action.

Google and Engage Lab did not immediately respond to requests for comment.

It’s unclear how many websites and users were affected, but according to Dantzig, Fox-IT “detected a relatively large amount of infections and infection attempts from this exploit kit among our customers.”

The Fox-IT researchers have yet to identify the specific malware program distributed through the campaign.

Malvertising has been a growing problem for years and despite large advertising networks claiming to have sophisticated defenses in place, attackers still find ways to bypass them.

These attacks are particularly dangerous, because users don’t need to visit obscure websites in order to get infected. Once attackers manage to push malicious ads onto a large advertising network, those ads get displayed on popular, generally trusted websites.

A 2014 investigation into malvertising by the U.S Senate concluded that “the online advertising industry has grown in complexity to such an extent that each party can conceivably claim it is not responsible when malware is delivered to a user’s computer through an advertisement.”

That’s because a typical online advertisement goes through five or six intermediaries before being displayed in a user’s browser and it can be replaced with a malicious one at any point in that chain. Website owners also have no control over what ads will be displayed on their websites, the U.S. Senate said.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author