Researchers have uncovered a recent malicious advertisement
campaign that’s notable for its size, scope, and resourcefulness. A two-day
blitz triggered as many as 5 million times per day that used highly camouflaged
JavaScript stashed in images to install a trojan on visitors' Mac computers. The
ads were served by a group security firm called Confiant, also known as VeryMal,
a name that comes from veryield-malyst.com, one of the ad-serving domains the
group uses. A run that was active from January 11 to January 13 on about 25 of
the top 100 publisher sites triggered the image as many as 5 million times a
day. This comes as an attempt to bypass increasingly effective measures
available to detect malicious ads, the images uses steganography; which is the
ancient practice of hiding code, messages, or other data inside images or text.
The end goal is the attack is to deliver this malicious (payload) to users who
visit the page that use Mac OS.
How does this work exactly? Well, a user viewing this image
on their Mac gets redirected to another website (hidden code in the image
creates a link) to which a pop-up ad will claim the user’s flash player Is out
of date. If the user takes the bait (clicks on the ad to download the supposed
update) then a trojan virus will instead be downloaded. This activity demonstrates
how malvertisers continue to improve their techniques for slipping malicious
content past advertisers, who actually pay to detect bad (infected) ads to
protect their users. People who want to protect themselves should stay vigilant
and detect suspicious advertisements, as well as keep all of their software up
to date.
https://arstechnica.com/information-technology/2019/01/malvertisers-target-mac-uses-with-stenographic-code-stashed-in-images/
Comments
Post a Comment