{"id":23979,"date":"2024-02-28T10:56:31","date_gmt":"2024-02-28T18:56:31","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17709\/"},"modified":"2024-02-28T10:56:31","modified_gmt":"2024-02-28T18:56:31","slug":"news-17709","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/02\/28\/news-17709\/","title":{"rendered":"Malvertising: This cyberthreat isn\u2019t on the dark web, it\u2019s on Google"},"content":{"rendered":"\n<p>On the internet, people need to worry about more than just opening suspicious email attachments or entering their sensitive information into harmful websites\u2014they also need to worry about their Google searches.<\/p>\n<p>That\u2019s because last year, as revealed in our <a href=\"https:\/\/try.threatdown.com\/2024-state-of-malware\/?utm_source=blog&amp;utm_medium=social&amp;utm_campaign=b2b_ws_global_2024_state_of_malware_170673145305\">2024 ThreatDown State of Malware report<\/a>, cybercriminals flocked to a malware <em>delivery<\/em> method that doesn\u2019t require they know a victim\u2019s email address, login credentials, personal information, or, anything, really.<\/p>\n<p>Instead, cybercriminals just need to fool someone into clicking on a search result that looks remarkably legitimate.<\/p>\n<p>This is the work of \u201cmalicious advertising,\u201d or \u201cmalvertising,\u201d for short. Malvertising is not malware itself. Instead, it\u2019s a sneaky process of placing malware, viruses, or other cyber infections on a person\u2019s computer, tablet, or smart phone. The malware that eventually slips onto a person\u2019s device comes in many varieties, but cybercriminals tend to favor malware that can steal a person\u2019s login credentials and information. With this newly stolen information, cybercriminals can then pry into sensitive online accounts that belong to the victim.<\/p>\n<p>But before any of that digital theft can occur, cybercriminals must first ensnare a victim, and they do this by abusing the digital ad infrastructure underpinning Google search results.<\/p>\n<p>Think about searching on Google for \u201crunning shoes\u201d\u2014you\u2019ll likely see ads for Nike and Adidas. A Google search for \u201cbest carry-on luggage\u201d will invariably produce ads for the consumer brands Monos and Away. And a Google search for a brand like Amazon will show, as expected, ads for Amazon.<\/p>\n<p>But cybercriminals know this, and in response, they\u2019ve created ads that <em>look<\/em> legitimate, but instead direct victims to malicious websites that carry malware. The websites themselves, too, bear a striking resemblance to whatever product or brand they\u2019re imitating, so as to maintain a charade of legitimacy. From these websites, users download what they think is a valid piece of software, instead downloading malware that leaves them open to further attacks.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1430\" height=\"845\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/KeyPass-Malvertising-2.png?w=1024\" alt=\"\" class=\"wp-image-104514\" \/><figcaption class=\"wp-element-caption\"><em>A malicious ad for the KeePass password manager appears as a legitimate ad.<\/em><\/figcaption><\/figure>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1430\" height=\"776\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/02\/KeyPass-Malvertising-1.png?w=1024\" alt=\"\" class=\"wp-image-104512\" \/><figcaption class=\"wp-element-caption\"><em><em>The real KeePass website (left) side-by-side with a malvertising site (right)<\/em><\/em>.<\/figcaption><\/figure>\n<p>It\u2019s true that malvertising is often understood as a risk to businesses, but the copycat websites that are created by cybercriminals can and often do <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/malvertising-its-a-jungle-out-there\">impersonate popular brands for everyday users, too<\/a>.<\/p>\n<p>As revealed in our 2024 ThreatDown State of Malware report, the five most impersonated brands for malvertising last year included:<\/p>\n<ol>\n<li>Amazon<\/li>\n<li>Rufus<\/li>\n<li>Weebly<\/li>\n<li>NotePad++<\/li>\n<li>TradingView<\/li>\n<\/ol>\n<p>These five brands may not all carry the same familiarity, but their products and services capture a broad swath of user interest, from Weebly\u2019s website creation products, to TradingView\u2019s investment trading platform, to Rufus\u2019s niche-but-useful portable OS booting tool.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-why-the-increase-in-malvertising-last-year\"><strong>Why the increase in malvertising last year?<\/strong><\/h2>\n<p>If Google ads have been around for more than a decade, why are they only being abused by cybercriminals now? The truth is, malvertising has been around for years, but a particular resurgence was recorded more recently.<\/p>\n<p>In 2022, cybercriminals lost access to one of their favorite methods of delivering malware.<\/p>\n<p>That summer, Microsoft announced that it would finally block \u201cmacros\u201d that were embedded into files that were downloaded from the internet. Macros are essentially instructions that users can program so that multiple tasks can be bundled together. The danger, though, is that cybercriminals would pre-program macros within certain files for Microsoft Word, Excel, or PowerPoint, and then send those files as malicious email attachments. Once those attachments were downloaded and opened by users, the embedded macros would trigger a set of instructions directing a person\u2019s computer to install malware from a dangerous website online.<\/p>\n<p>Macros were a scourge for cybersecurity for years, as they were effective and easy to deliver.<\/p>\n<p>But when Microsoft restricted macro capabilities in 2022, cybercriminals needed to find another malware delivery channel. They focused on malvertising.<\/p>\n<p>Today\u2019s malvertising is increasingly sophisticated, as cybercriminals can create and purchase online ads that target specific types of users based on location and demographics. Concerningly, modern malvertising can even avoid basic fraud detection as cybercriminals can create websites that determine whether a user is a real person or simply a bot that is trawling the web to find and flag malicious activity.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-how-to-protect-against-malvertising\"><strong>How to protect against malvertising<\/strong><\/h2>\n<p>The threat of malvertising is multi-layered: There are the fraudulent ads that cybercriminals place on Google search results, the malicious websites that imitate legitimate brands and companies to convince users to download malware, and the malware infection itself.<\/p>\n<p>As such, any successful defense strategy must be multi-layered.<\/p>\n<p>For safe browsing, people can rely on <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">Malwarebytes Browser Guard<\/a>, a browser extension that blocks third-party tracking and flags malicious websites known to be in the control of cybercriminals. As we wrote before:<\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cMalwarebytes Browser Guard&nbsp;provides additional protection to standard ad-blocking features by covering a larger&nbsp;area of the attack chain all the way to domains controlled by attackers. Thanks to its built-in heuristic engine it can also proactively block never-before-seen malicious websites.\u201d<\/p>\n<\/blockquote>\n<p>The problem with malvertising, though, is that new malicious websites are created every single day. Cybersecurity defenders, then, are often caught in a game of catch-up.<\/p>\n<p>Here, users can find safety from <a href=\"https:\/\/www.malwarebytes.com\/premium\">Malwarebytes Premium<\/a>, which provides real-time protection to detect and stop any cyberthreats that get installed onto a device, even if those threats are masquerading as legitimate apps or software.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/02\/malvertising-this-cyberthreat-isnt-on-the-dark-web-its-on-google\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Malvertising made a resurgence in 2023, with cybercriminals creating malicious ads and websites imitating Amazon, TradingView, and Rufus.  <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[5588,22979,10531,22982,32,29949,26699,30906,11196,30864,30907,29102],"class_list":["post-23979","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-amazon","tag-browser-guard","tag-malvertising","tag-malwarebytes-browser-guard","tag-news","tag-notepad","tag-personal","tag-rufus","tag-state-of-malware","tag-state-of-malware-2024","tag-tradingview","tag-weebly"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23979"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23979\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}