AdSecure Releases Report on 'Malvertiser' Activity During Pandemic

AdSecure Releases Report on 'Malvertiser' Activity During Pandemic

DUBLIN — AdSecure has released a report concerning trends in malicious online activity during the COVID-19 pandemic.

The company monitored malicious activity from March 1 to April 15, 2020 to see how the COVID-19 health crisis was being exploited by bad actors.

“As millions of people are now working from home, where online security isn’t as stringent compared to office cybersecurity systems, the pandemic has created a perfect storm for malvertisers,” the report begins.

AdSecure concluded that malicious attacks grew exponentially alongside lockdowns and hit a peak of +116.14% on March 18.

This is the rest of AdSecure's report on “malvertisers”:

As lockdowns began to be introduced across the globe, the number of attacks increased dramatically.

The blue line represents the percentage rate of malvertising attacks based on comparing daily data with the number of attacks on March 1, and the red line represents the trend analysis.

We observed an increase in threats worldwide, particularly in the digital advertising ecosystems of prized “Tier 1” GEOs. Though subsiding somewhat from the massive spikes in late March, threat levels remain strong through the first half of April, with a more consistent, sustained pattern of attack, remaining significantly higher than levels detected during the first half of March.

Malvertiser’s Weapons of Choice

Malvertisers are using well-known logos — including the World Health Organization logo — to fool users into clicking on malware ads.

When analysing data on threat levels, we identified specific increases in the deployment of 4 types of malvertising attacks: Adware, Malware, Phishing Scams, and a very heavy use of Scareware attacks.

Many of these attacks made use of major branding that would be instantly familiar to their intended targets — phishing attacks leveraging fake Walmart offers in the US, Intermarche in France, and Amazon in multiple countries.

With the terms “Coronavirus”, “COVID-19”, and WHO (Word Health Organization) in the news constantly, malvertisers are using them to manipulate users, playing on their fears and anxieties to get them engaged with bad ads containing Malware.

In the example below, AdSecure found a mobile banner ad in Italian, one of the countries worst hit by the pandemic. The ad delivers Malware via an auto-download, using the logo of the World Health Organization (WHO) and the GooglePlay logo to imply legitimacy.

The text translates to: “Ways to get rid of Coronavirus. Download the life-saving form here to stop this global pandemic.”

However, the text is not grammatically correct in Italian, so was obviously translated from another language — through Google Translate perhaps — so hopefully that deterred some end users from clicking on the banner ad.

Scareware Has Been the Preferred Choice of the Cybercriminal

Above all, the favourite attack delivery method during this spike in malicious activity appears to be Scareware, fake alerts claiming an imminent or existing threat to a user’s device — which of course does not exist — and is designed to trick the user for falling into a scam.

Scareware attacks grew exponentially, if we take the data from March 1 as the control, by March 4 there was a 485% increase by March 6 a 2,628% increase and by March 8 a 3,342% increase, where it remained at this new high right through to April 15.

While the style and tone of Scareware attacks can vary, we often see these take the form of a tech support scam, wherein users are alerted that their system is infected with certain types of virus, or spyware.

Again, cybercriminals often rely on the iconography of well-known brands to imply legitimacy, convince users that they will indeed be contacting Microsoft technical support, as seen in the examples below:


Of course, the user isn’t contacting Microsoft, they’re falling into a trap.


Bad Ads Surged Globally, but the U.S. Got Hit Particularly Hard

AdSecure examined which were the top 5 GEOs that received the highest malvertising attacks:

Tier 1 GEOs faced a wave of attacks with malvertisers heavily targeting the United States, with detected threats in the U.S. nearly 3x higher than in the other top 4 GEOs.


Windows PCs and iPhones Were Among Malvertisers’ Top 5 Device Choices

Windows laptops and PCs came out on top as malvertisers attacked users working from home. For Apple users, the iPhone 8 and iPhoneX were top of the cybercriminal devices to attack.

AdSecure’s Sales Manager Bryan Taylor commented, “There isn’t much safety to be found in any particular device and browser combination, either, as throughout March and April we can see that threats are being detected consistently across multiple devices and browsers.”

With more people frequently browsing on both their desktop and mobile devices and using multiple browser options, Taylor added, “malvertisers can spread their attacks accordingly, maximizing the effective impact of each bad ad campaign they are running.”

“With this sustained increase in malicious activity within the digital advertising ecosystem,” Taylor continued, “it’s likely that as social distancing measures, and lockdowns continue while the world get’s a collective handle on the COVID-19 crisis, cybercriminals will continue to take advantage of the situation by deploying malicious ads, and it is vital that the industry remain vigilant in the fight against malvertising, particularly during the unprecedented times we all find ourselves in.”

“AdSecure is here to help publishers and ad platforms with the challenge of fighting malicious and poor quality ads while maintaining user safety and experience,” said a rep. “Our free trial account is available to anyone looking to #StopBadAds.”

To learn more, reach AdSecure at contact@adsecure.com.

Related:  

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More News

FSC Drops Opposition to California Age Verification Bill After Amendments

Free Speech Coalition (FSC) has dropped its formal opposition to California’s age verification bill AB 3080, after an amendment secured through months of discussions with the bill’s author was heard by the Senate Judiciary Committee.

SCOTUS Agrees to Hear Texas Age Verification Challenge

The United States Supreme Court granted on Tuesday the petition for a writ of certiorari in the Free Speech Coalition-led challenge to Texas’ age verification law, agreeing to hear the case in the next term.

Dorcel Group Acquires LifeSelector

Dorcel Group has acquired interactive content company LifeSelector.

Etsy Updates Policy to Ban Sale of Most Adult Pleasure Products, Content

Etsy will ban sales of most pleasure products and content that depicts sex acts and genitalia starting July 29.

Jamie Page Is LoyalFans' 'Featured Creator' for July

LoyalFans has named Jamie Page as its Featured Creator for July.

Byborg's Le Shaw Research Institute Teams Up With SWOP Behind Bars

LiveJasmin parent company Byborg Enterprises’ Le Shaw International Sexual Health and Wellness Research Institute has joined forces with U.S.-based sex worker advocacy group SWOP Behind Bars.

AI Erotic Storytelling Platform 'Erota' Launches

Erota, a new AI-powered erotic storytelling platform, has debuted.

Indiana Court Blocks Age Verification Law

A U.S. district court in Indiana has blocked the state's age verification law from taking effect this coming Monday, July 1.

Sex Worker Rights Advocates Speak at UN Criticizing Stigmatizing Report

Several sex worker rights organizations and advocates provided input this week at the United Nations office in Geneva, addressing a recent controversial report by the Human Rights Council’s special rapporteur on violence against women and girls, which made broad claims about sex work and adult content, and also endorsed different forms of criminalization.

DickHDDaily Launches Through YourPaysitePartner

New paysite DickHDDaily.com has launched through YourPaysitePartner (YPP).

Show More