Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Malicious Ad Networks Target Mobile Devices

Malicious Web advertising has long been a way for attackers to compromise PCs, but now the technique appears to be making its way to the world of mobile devices.

Malicious Web advertising has long been a way for attackers to compromise PCs, but now the technique appears to be making its way to the world of mobile devices.

According to Palo Alto Networks, attackers are using malicious ads to silently infect users. Mobile ad networks require the mobile application to reach out to the Web and pull the correct ad, which requires the developer install a software development kit [SDK] or other software into the mobile application so the ad can be displayed. In the event the ad network is malicious, this effectively brings malicious content to anyone who downloads the application.

“There is a very low barrier to entry for someone to become an ad network,” said Wade Williamson, senior security analyst, Palo Alto Networks. “Some open source software and a bit of marketing can get the ball rolling. Secondly, there are a lot of independent app developers and by and large ads are the way that they make any money off of their applications. So they are naturally going to looking for the best deals that they can – A disreputable ad network can promise a developer higher returns and lure in developers pretty easily.”

Once the device is compromised, the attackers can use it to make calls to premium numbers and commit other types of malicious acts.  

So far, only a handful of this type of malware has been seen in the wild, Williamson told SecurityWeek. The attacks are largely slipping under the radar, primarily because the malware was unknown and the delivery method uses the way mobile applications are supposed to behave.

This is not the first time this type of malicious ad networks has been found targeting mobile users.  In April, Lookout Mobile Security detected a malware threat known as BadNews in 32 apps from four different developer accounts found on Google Play. The applications were downloaded between two million and nine million times before being removed by Google.

Last December, Trend Micro noted the threat this posed in a report entitled ‘The Hidden Risk Behind Mobile Ad Networks’, and observed that some of the top mobile ad networks had recently released new SDKs with mandated opt-in mechanisms that give app users the option to either allow or forbid ad networks to collect data and display ads outside of apps.

“The industry has been spending its time trying to make sure that the applications in app stores are safe and free of malware,” he said. “But this method can take a completely valid and benign application and use it bring down malware. If the malware file isn’t known, then it’s very easy for this behavior to go unnoticed.”

Research into the origin of the threat is ongoing, but according to Palo Alto Networks, the samples they discovered originated in Asia. To help combat the threat, the company has added new capabilities in its WildFire malware analysis sandbox that enable it to analyze Android applications in the APK file format to detect malicious content embedded within Android applications.

Advertisement. Scroll to continue reading.

“There is very little that a user can do for this type of problem because this type of infection can happen even if the end user does everything right,” Williamson said. “I think the industry needs to do a better job of establishing reputation for reputable ad networks so that developers can easily choose a service that is established and safer.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.