Google's advertising subsidiary DoubleClick and Microsoft’s MSN ads
service both have admitted to falling for a clever scheme by some nasty black
hat hackers. Malicious banner ads for both services were
found to be trying to perform drive-by download exploitation and install
malware on users' machines.
As with many great (or terrible) episodes of computer crime, a key
component was clever social engineering. Hackers created a site called
ADShufffle.com -- one letter away from ADShuffle.com, a major online
advertising technology firm. Apparently that was enough to get the ads
through screeners at Microsoft and Google.
Security firm Armorize appears to be the first to have noticed the
attack. Wayne Huang chief technology officer of Armorize details the
unusual incident in a blog, writing:
Users visit websites that incorporate banner ads from DoubleClick or
three f's), starts a drive-by download process and if successful, HDD Plus and
other malware are installed into the victim's machine, without having the need
to trick the victim into doing anything or clicking on anything. Simply
visiting the page infects the visitors.
Known sites affected: Sites that incorporate DoubleClick or
rad.msn.com banners, including for example Scout.com (using DoubleClick),
realestate.msn.com, msnbc.com (using both), and mail.live.com. We'd like to
note here it's very possible that multiple exchanges, besides those listed
here, have been serving the fake ADShufffle's ads.
For all its ingenuity, the attackers used pretty standard exploitation
packages, including Neosploit and the Eleonore exploit kit. Both kits are
popular among black hat hackers, but also among security experts who purchase
them to battle-test the security of corporate systems.
procedure, which was triggered when users visited a page that was serving the
compromised banner ads. The ad service would then request the code for
the ad from the hackers' servers, initiating the attack.
A Google spokesperson assured that the ads were only up for a very
brief time and have since been terminated. The company is now
investigating the incident. Microsoft did not release a statement, but
likely is taking similar measures.
incident is not Google's first brush with malware advertising. Previously
malicious hackers were found to be leveraging Google's AdWords service. In
that case, as well, the key to the criminals' success was using
quote: But they can't control a night security guard deciding to use it to browse the web instead of doing his rounds.
quote: You're arguing for an update merely because of age.
quote: If the customer only needs software updates once every 5 years, then that is what the market should bear.
quote: I grew up working with Unix systems, so I'm a bit unsympathetic to Microsoft's growing pains...
quote: That's a very narrow and IT-centric view of how to run a business.
quote: The narrow gap between spending just enough money that things don't go to hell
quote: If someone's computer goes down, you immediately swap in a replacement so they can get back to work with little to no downtime. IT then deals with the broken computer, either fixing it or salvaging usable parts from it to fix other broken computers.
quote: Your server is where you spend the big bucks to maintain 99.999%+ uptime.