Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

Massive Malvertising Network is 9 Times Bigger Than Originally Thought: Cisco

New research from Cisco Systems shows the ‘Kyle and Stan’ malvertising network is much bigger than it first appeared.

In fact, it is nine times bigger.

New research from Cisco Systems shows the ‘Kyle and Stan’ malvertising network is much bigger than it first appeared.

In fact, it is nine times bigger.

Two weeks ago, Cisco’s Talos Security Intelligence and Research Group revealed the existence of the network, which was responsible for placing malicious advertisements on websites such as amazon.com, ads.yahoo.com, youtube.com and 70 other domains. What they found however, was just the beginning.

“The “Kyle and Stan” network is a highly sophisticated malvertising network,” blogged Armin Pelkmann, threat researcher with Cisco. “It leverages the enormous reach of well placed malicious advertisements on very well known websites in order to potentially reach millions of users. The goal is to infect Windows and Mac users alike with spyware, adware, and browser hijackers.”

Advertisement. Scroll to continue reading.

According to Pelkmann, Cisco has now isolated 6,491 domains sharing the same infrastructure – more than nine times more than the previously reported 703 domains.

“We have observed and analyzed 31151 connections made to these domains,” he blogged. “This equals over 3 times the amount of connections previously observed. The increase in connections is most likely not proportional to the domains due to the fact that a long time that has passed since the initial attacks.”

The first attempts to spread malware, spyware and adware are dating back to January 2012, he wrote.

“The domains of the type kyle.mxp677.com, stan.mxp681.com and lpmxp47.com seem to have usually a relatively short lifespan until they get replaced,” he blogged. “The attacker seems to use them for a short while, burn them and move on to the subsequent number. Domains like megashre.info or file36.com seem to be used for a longer period and are still active.”

“Noteworthy is that the popular domain www.winrar.com is also part of  these attackers network,” he continued. “The website is build to fool visitors into believing they are installing the popular compression tool WinRar, but instead they are downloading malware. This website exhibits a significant traffic load and is a good example on how the attackers behind this network are trying to fool users into installing their malware.

The malware droppers used in the campaign leverage “clever techniques and encryption” to ensure unique checksums to avoid detection, Pelkmann noted.

“The count of websites connected to the attacker’s infrastructure is now up to 6491 and is growing daily,” he wrote. “The fact that parts of this infrastructure date back to January 2012 is concerning, as it shows that the threat actors have been active for over 2 and a half years.”

In its 2014 Midyear report, Cisco called malvertising a “disruptor for the Internet economy.”

“Malvertising is becoming more prevalent, and adversaries are able to launch highly targeted campaigns,” the report notes. “A malvertiser who wants to target a specific population at a certain time—for example, soccer fans in Germany watching a World Cup match—can turn to a legitimate ad exchange to meet their objective.”

Last week, researchers with MalwareBytes reported that the websites of The Times of Israel and The Jerusalem Post were serving malicious advertisements that redirected victims to a page hosting the Nuclear Exploit kit.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.