May 30, 2017 By Larry Loeb 2 min read

Malvertising is one of the biggest schemes that users have to watch out for when surfing the web, and the challenge of avoiding it may only be getting worse as scams become more sophisticated. For example, a recent Malwarebytes report revealed that RoughTed, a sophisticated malvertising campaign designed to bypass ad-blocking software, may have been active for over a year before it was first detected in March 2017.

The firm reported that visits to the malware’s domain totaled 500 million in the past three months. The U.S. and Canada were the hardest hit regions, followed by the U.K., Italy, Spain and Brazil. Researchers also discovered that Rig and Magnitude are among the most frequently delivered exploit kits (EKs).

Malvertising Leaks Through Ad Blockers

Attackers are performing redirections using dynamically created scripts to subvert ad blockers, according to the report. The script gets its data from a different URL every day, which makes URL blocking difficult. Users of Adblock Plus, uBlock Origin and AdGuard have reported malvertising getting through the blockers, the researchers said.

Although the malware drives traffic to its domains from many sources, it mainly uses rogue ads that contain embedded scripts. Since it also uses various fingerprinting techniques, RoughTed can deliver different malicious payloads depending on the victim’s configuration.

Fingerprinting for Custom Payloads

“[T]here is some aggressive fingerprinting, which I think most ad networks wouldn’t do because it’s very privacy invasive,” a Malwarebytes researcher told Bleeping Computer. The fingerprinting includes tests for browser type, operating system (OS), language settings and geolocation information. Another check scans for installed fonts in the victim system, which varies based on the victim’s OS.

A victim may be redirected to a number of targets specifically designed for his or her OS. These include tech support scam pages, download pages for Mac adware, download pages for Windows potentially unwanted programs (PUPs), rogue Chrome extensions and pay-per-install schemes that depend on the App Store or iTunes.

Users with ad-blocking software must be on guard against such a sophisticated campaign. Do not download supposed updates that come from unverified sites. Additionally, be sure to carefully check URLs to determine which sites are sending and receiving information.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today