{"id":13929,"date":"2018-11-28T09:10:14","date_gmt":"2018-11-28T17:10:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/11\/28\/news-7696\/"},"modified":"2018-11-28T09:10:14","modified_gmt":"2018-11-28T17:10:14","slug":"news-7696","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/11\/28\/news-7696\/","title":{"rendered":"Malwarebytes helps take down massive ad fraud botnets"},"content":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 28 Nov 2018 14:00:54 +0000<\/strong><\/p>\n<p>On November 27, the US Department of Justice <a href=\"https:\/\/www.justice.gov\/usao-edny\/pr\/two-international-cybercriminal-rings-dismantled-and-eight-defendants-indicted-causing\" target=\"_blank\" rel=\"noopener\">announced<\/a> the indictment of eight individuals involved in a major ad fraud case that cost digital advertisers millions of dollars. The operation, dubbed <a href=\"https:\/\/www.whiteops.com\/3ve\" target=\"_blank\" rel=\"noopener\">3ve<\/a>, was the combination of the Boaxxe and Kovter botnets, which the FBI\u2014in collaboration with researchers in the private sector, including one of our own at Malwarebytes\u2014was able to dismantle.<\/p>\n<p>The US CERT <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-331A\" target=\"_blank\" rel=\"noopener\">advisory<\/a> indicates that 3ve was controlling over 1.7 million unique IP addresses between both\u00a0Boaxxe and Kovter at any given time. Threat actors rely on different tactics to generate fake traffic and clicks, but one of the most common is to infect legitimate computers and have them silently mimic a typical user&#8217;s behavior. By doing so, fraudsters can generate millions of dollars in revenue while eroding trust in the online advertising business.<\/p>\n<p>This criminal enterprise was quite sophisticated in that it had many evasion techniques that not only made it difficult to detect the presence of ad fraud, but also clean up affected systems. Kovter in particular is a unique piece of malware that goes to great lengths to avoid detection and even trick analysts. Its <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2016\/07\/untangling-kovter\/\" target=\"_blank\" rel=\"noopener\">fileless nature to maintain persistence<\/a> has also made it more challenging to disable.<\/p>\n<p>Malwarebytes, along with several other companies, including Google, Proofpoint, and ad fraud detection company <a href=\"https:\/\/www.whiteops.com\/\" target=\"_blank\" rel=\"noopener\">White Ops<\/a>, was involved in the global investigation into these ad fraud botnets. We worked with our colleagues at\u00a0White Ops, sharing our intelligence and samples of the Kovter malware. We were happy to be able to leverage our telemetry, which proved to be valuable for others to act upon.<\/p>\n<p>Even though cybercriminal enterprises can get pretty sophisticated, this successful operation proves that concerted efforts between both the public and private sectors can defeat them and bring perpetrators to justice.<\/p>\n<p>The full report on 3ve, co-authored by Google and White Ops, with technical contributions from Proofpoint and others, can be downloaded <a href=\"https:\/\/services.google.com\/fh\/files\/blogs\/3ve_google_whiteops_whitepaper_final_nov_2018.pdf\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/11\/teamwork-takes-massive-ad-fraud-botnets\/\">Malwarebytes helps take down massive ad fraud botnets<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/11\/teamwork-takes-massive-ad-fraud-botnets\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Wed, 28 Nov 2018 14:00:54 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/11\/teamwork-takes-massive-ad-fraud-botnets\/' title='Malwarebytes helps take down massive ad fraud botnets'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/11\/shutterstock_568905061.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Malwarebytes joins the fight against ad fraud in one of the largest take down operations.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/malwarebytes-news\/\" rel=\"category tag\">Malwarebytes news<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/3ve\/\" rel=\"tag\">3ve<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ad-fraud\/\" rel=\"tag\">ad fraud<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fbi\/\" rel=\"tag\">fbi<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malwarebytes\/\" rel=\"tag\">Malwarebytes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/white-ops\/\" rel=\"tag\">white ops<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/11\/teamwork-takes-massive-ad-fraud-botnets\/' title='Malwarebytes helps take down massive ad fraud botnets'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/malwarebytes-news\/2018\/11\/teamwork-takes-massive-ad-fraud-botnets\/\">Malwarebytes helps take down massive ad fraud botnets<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20266,10499,6627,10560,10546,20267],"class_list":["post-13929","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-3ve","tag-ad-fraud","tag-fbi","tag-malwarebytes","tag-malwarebytes-news","tag-white-ops"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13929","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13929"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13929\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13929"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13929"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13929"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}