Millions of web users caught up in massive malvertising campaign
The malicious ads are now going after mobile users
Security researchers have shared details about an ongoing malvertising campaign that has compromised over a hundred ad servers, despite early warnings.
Eliya Stein, Senior Security Engineer at security firm Confiant, has been tracking the malvertising threat actor known as Tag Barnakle for over a year now.
Stein first reported the malvertising campaign in April 2020 when he found sixty compromised ad servers that had been exploited.
We're looking at how our readers use VPN for a forthcoming in-depth report. We'd love to hear your thoughts in the survey below. It won't take more than 60 seconds of your time.
- Here's our choice of the best malware removal software on the market
- We’ve also rounded up the best ransomware protection tools
- Protect your devices with these best antivirus software
One year later, however, Stein reports that the threat actor has continued to operate unchecked and the number of breached servers has doubled to over 120.
Lethargic response
Stein asserts that most malvertising groups infiltrate the advertising ecosystem as legitimate media buyers. However, what sets Tag Barnakle apart from the rest is that this threat actor resorts to compromising the ad-serving infrastructure instead.
The research shows that Tag Barnakle targets advertising companies that use a vulnerable instance of the Revive ad server. Once identified, it inserts malicious code into legitimate ads that redirects website visitors to sites that promote scams and malware.
Worryingly, however, while Stein’s research prompted the developers of the Revive ad server to urge its customers to upgrade to their ad server installation, few have done so.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
The result of the lethargy shown by the online advertising companies is that the number of compromised Revive servers has grown to over 120 since Stein’s last warning.
Widespread reach
Commenting on the scope of the attacks, Stein argues that some of the owners of the compromised ad servers are also using real-time bidding (RTB) systems to broadcast their ads to other ad companies.
“If we consider that some of these media companies have RTB integrations with leading programmatic advertising platforms, Tag Barnakle’s reach is easily in the tens if not hundreds of millions of devices,” writes Stein.
He also notes that while Tag Barnakle was targeting users of desktop browsers last year, the ads have now started going after mobile users, luring them into installing obscure apps that either have hidden subscription costs or siphon their traffic for nefarious purposes.
- These are some of the best endpoint protection software
Via The Record
With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.