Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

12/20/2019
11:10 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Happier Holidays as Ad Threat Declines

DEVCON report finds that the number of ad-threat JavaScript attacks in the US diminished year-over-year, but what attacks there were increased in sophistication.

Security firm DEVCON has issued its 2019 Holiday Threat Reportwhich looks at the online scene occurring this year between Thanksgiving and Cyber Monday.

The report finds that the number of ad-threat JavaScript attacks in the US diminished year-over-year, but what attacks there were increased in sophistication. DEVCON uses the term "Ad Threat" to define a type of 3rd Party JavaScript exploitation that was in the advertising space and to separate it from the more general industry problem -- ad fraud.

Every third-party service that offers animated graphics, photo slideshows, chat bots, or shopping carts creates new vulnerabilities for the organizations that use them with the embedding of JavaScript.

DEVCON found that, “a dramatic decline in the volume of many simplistic ad hacks over the last year. Less advanced hackers are being shut out of the ad threat game, but the more advanced bad actors are not only becoming more stealthy in obfuscating these attacks, they have escalated the types of exploits, broadened the attack surface and they are not limiting these attacks to the ad tag scripts.”

So, what does “3rd Party JavaScript” do for an attacker? One route it enables is that bad actors are creating fake accounts with ad networks and using that company's ad tags to deliver exploits onto sites without ever needing to compromise the target company's servers.

Partner exploitation can happen when the attacker looks for third-party partners on checkout or payment pages and finds one that is easily compromised. That code is then used to gain access and collect user data as users are entering it.

Of course, an attacker can use any inherent vulnerabilities in the JavaScript itself (or the libraries that it uses) to carry out their attack.

Also, in the case of infected assets like image files, fonts or ads, JavaScript that is being delivered back and forth can be used to hide exploits. An image for an ad that has been infected with malicious script would be an example of this.

The report says that 2019 has seen malvertisers switch from almost entirely targeting mobile devices to the majority targeting desktop browsers. The desktop exploits are usually far more devastating to the victim when successful than the mobile redirects since they deliver a much more capable and malicious payload like a trojan.

Over 60% of the activity DEVCON observed over the shopping holiday came from variants of the Led Zelpdesk, Lucky Star, Avid Diva and Invisible Ink attacks. These attacks use a combination of social engineering and exploited JavaScript to steal a user's credit card information, have them download a trojan, or both.

It has been a continuing trend that malvertising activity has been down year over year. The report found .07% of ads over this time period contained malicious code in 2019, as opposed to 1.25% in 2018. There is no clear indicator of why this holiday shopping season saw so relatively few bad ads, but there are several factors that could contribute.

The report thinks that the security of the ad ecosystem may be influenced by market-based factors. If ad networks raise the standards for admitting buyers into their system, malvertisers will find it more difficult to sneak in.

It may be that the increased attention to the problem and adoption of security tools could also be dissuading cybercriminals who have previously experienced easier environments for cybercrime in this time period.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-20934
PUBLISHED: 2020-11-28
An issue was discovered in the Linux kernel before 5.2.6. On NUMA systems, the Linux fair scheduler has a use-after-free in show_numa_stats() because NUMA fault statistics are inappropriately freed, aka CID-16d51a590a8c.
CVE-2020-29368
PUBLISHED: 2020-11-28
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
CVE-2020-29369
PUBLISHED: 2020-11-28
An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe.
CVE-2020-29370
PUBLISHED: 2020-11-28
An issue was discovered in kmem_cache_alloc_bulk in mm/slub.c in the Linux kernel before 5.5.11. The slowpath lacks the required TID increment, aka CID-fd4d9c7d0c71.
CVE-2020-29371
PUBLISHED: 2020-11-28
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.