Security Experts:

Connect with us

Hi, what are you looking for?


Malware & Threats

Yahoo Attack Spotlights Challenges of Malvertising

For a few days, served up more than just search results. For its European customers, it also served up malicious ads.

Unfortunately for the infected, malvertising continues to pose a problem to websites of all sizes, and policing the ecosystem of online advertising remains a serious challenge.

For a few days, served up more than just search results. For its European customers, it also served up malicious ads.

Unfortunately for the infected, malvertising continues to pose a problem to websites of all sizes, and policing the ecosystem of online advertising remains a serious challenge.

“Spreading malware over the Web is about traffic volume,” said Wayne Huang, vice president of Armorize Technologies at Proofpoint. “Large websites have the volume, but it’s much harder to hack [them]. However, all large websites serve advertisements.”

During the last 30 days, researchers at Blue Coat Systems have detected 47 different IP addresses used by malvertisement servers. Nearly all of that traffic occurred beginning on Dec. 29, with Jan. 2nd and Jan. 3rd being the high-water marks, explained Chris Larsen, malware researcher at Blue Coat Systems.

MalvertisingIn the case of the recent Yahoo incident, the attackers were able to spread malware from Dec. 31 to Jan. 3 by redirecting users to sites hosting the Magnitude exploit kit. It was not made clear in Yahoo’s statement exactly what part of the online advertisement ecosystem the attackers were able to infiltrate. According to Online Trust Alliance Executive Director Craig Spiezle, many of these incidents happen by the accepting of an ad through an ad exchange and not just through ads companies like Yahoo accept directly.

The vast number of third-parties involved in the process of pushing ads makes addressing the issue complex.

“The way ad serving is set up today is assuming everyone is trustworthy,” Spiezle said. “So you have advertisers, you have ad agencies, you have ad networks, you have ad aggregators, you have ad exchange, you have all these third-parties that touch an ad or could be putting in an ad or an ad tag to make it very efficient for sites to take and receive advertising. So that’s all great. But that same flexibility in the design makes it very easy to [penetrate] and compromise any one of those.”

According to RiskIQ CEO Elias Mansousos, the number one attack vector for malvertisers is the impersonation of legitimate ad creators and agencies.

“ATO [account takeover] is also a major vector since many agency accounts are trusted,” he said. “If a malvertiser gains access to these accounts, they are more likely to get suspect creative approved even against an ad quality team’s better judgment. Number three is hacking of the infrastructure. You see this more with hosted ad servers running smaller networks or agencies.”

Since a successful malvertising attack on a high-traffic site can represent a significant bounty for attackers, the threat remains persistent. The Online Trust Alliance [OTA] has been examining the issue of malicious ads for years. Among its recommendations is to create an accreditation/authentication process for new clients and ad agencies and to decline those that do not meet its standards.

But even that can fall short if ad providers are not continually measured against those requirements, Larsen said.

“A lot of it happens more or less automatically – once the ‘big ad network’ has vetted a prospective new partner, my sense is that they don’t pay nearly as much attention to what that ad provider is doing now compared to its behavior during the vetting process,” he added. “Also, there can be multiple layers of providers involved, and they’re all serving chunks of obfuscated javascript instead of a simple banner graphic like the old days. Nowadays it’s all about the metrics, and to gather those you need javascript. So it’s often very hard for the host site for example to know who actually served the final ad in that space that they turned over to the big ad network.”

“If I had my way, I would eliminate dynamic content,” opined Chester Wisniewski, senior security advisor at Sophos. “Strict adherence to only retrieving ads from a short list of trusted domains and images only. No JavaScript, no video, etc. The destinations also need to be screened on a frequent basis to be sure they have not fallen victim to attackers as well.”

“If you run your own ads, be sure you have humans checking the veracity of the ads and those placing them,” he added.

Other solutions to the problem include taking a code-signing approach similar to what is done in the world of mobile applications, Spiezle noted. However, like other proposed fixes, this can add friction, time and cost to the process of publishing ads, he said. Still, it is clear that the industry address the issue through malware scanning, code testing and having a strong vetting process.

“This [attack on Yahoo] needs to be a wakeup call that systemic changes must be in place to protect consumers from harm,” Spiezle said.

Written By

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.


More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.