Hackers Use Banner Ads on Major Sites to Hijack Your PC 268
The worst-case scenario used to be that online ads are pesky, memory-draining distractions. But a new batch of banner ads is much more sinister: They hijack personal computers and bully users until they agree to buy antivirus software. And the ads do their dirty work even if you don't click on them.The malware-spiked ads have been spotted on various legitimate websites, ranging from the British magazine The Economist to baseball's MLB.com to the Canada.com news portal. Hackers are using deceptive practices and tricky Flash programming to get their ads onto legitimate sites by way of DoubleClick's DART program. Web publishers use the DoubleClick-hosted platform to manage advertising inventory." CT: Link updated to original source instead of plagerizer.
oh great (Score:5, Funny)
Re:oh great (Score:5, Funny)
What are these "ads" you're talking about ? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2, Informative)
on some sites i want to allow scripts but block flash... and this is the best solution i've found.
Re: (Score:2)
Re: (Score:2)
Never Experienced This (Score:4, Insightful)
Re:Never Experienced This (Score:4, Funny)
Unrelated thoughts:
1) YouTube video is a rather inefficient way to distribute this analysis.
2) The security guy is way too kind to the sites hosting these ads. I've written to several of them, telling them how sleazy the ads are and how bad they make the site look, and the ads are still there.
3) How did YouTube decide that "ridiculously hot LATINA girl dancing, not asian!" is a Related Video? Except in the sense that it's always relevant, I mean.
Re:Never Experienced This (Score:5, Funny)
Re:Never Experienced This (Score:4, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Very stupid idea (Score:3, Informative)
The "let's ban it" attitude seems awfully familiar. Are you a member of the US, UK, or EU parliament by any chance?
Like it or not, but advertising generates (directly and indirectly) the revenue that drives the Internet. When advertisement is passive, and does not attempt to hijack your computer, it is theoretically an win-for-all scenario: the advertisers get their clients, the consumers get their products, and the sites that host the a
Re: (Score:2)
Not quite passive if they're using Flash, though. I'm selective with my AdBlocking because I know some webmasters rely on the revenue. Anything that's overly flashy (be it flash or animated GIF) or anything too large/overlapping/intrusive gets the page or folder containing the add blocked. If it happens too many times then the entire domain goes.
As for the drive-by infection, hasn't that been going on for a
Re: (Score:2)
On reputable sites I usually disable AdBlock plus, but I always use FlashBlock, as nothing annoys me more than flash ads.
Re: (Score:2)
Re: (Score:2)
> because I know some webmasters rely on the revenue.
If I did that the "harm" would just be transferred to the advertisers as I will never buy what they are selling. I see no reason to worry about it, though.
Re: (Score:2)
Re: (Score:3, Insightful)
Like it or not, but advertising generates (directly and indirectly) the revenue that drives the Internet. When advertisement is passive, and does not attempt to hijack your computer, it is theoretically an win-for-all scenario: the advertisers get their clients, the consumers get their products, and the sites that host the advertisement get their costs and expenses covered.
You are very much mis
Your company/family/school (Score:5, Interesting)
I would say that adzapper (if you use squid) or a DNS-based blacklist is quite mandatory wherever you do have a say. Glancing at the logs of ISPs I have root at, roughly 1/4 of all freaking http requests go to lowlifes -- and even that based on my grossly incomplete list of ad/spyware/tracking scum.
Yeah, 25%. That's horrible.
And there are some customers dumb enough to complain if you do protect them from ads, so you can't do this in an ISP scenario. But in a company, school or family? Hell yeah, there's no reason for doubleclick.com to get through, ever.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:Your company/family/school (Score:5, Informative)
It also can block ads (although not with a blacklist as FF, but you can block whole domains).
To me the lesser minds are the ones that can't respect other people choices.
Re: (Score:2)
I run Firefox with Noscript on Linux, and using a different browser (I used to use a different user) for sensitive websites. Is this malware likely to affect me?
Re: (Score:2)
These sights should drop DoubleClick immediately and switch to another ad partner. They should also consider a lawsuit. If they do nothing but point a finger
Re: (Score:2)
However it is really annoying when I have to use some computer with IE 5,6 or 7 without adblock because I feel the web *very* polluted. It akin to when you live in a small city with almost no advertising and then you move to Mexico C
And the funny thing is... (Score:2)
Some people complain about Firefox AdBlock? Sheesh.
Note to self: remember to program Adblock to reject everything from DoubleClick from now on, on all home computers.
Re: (Score:2)
Re: (Score:2)
First site on my block list (Score:2)
Note to self: remember to program Adblock to reject everything from DoubleClick from now on, on all home computers.
I use Adblock and NoScript on Firefox. Doubleclick is the first site on the block list in both apps. That's why I couldn't figure out why Google wanted to buy them.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Why?
AdBlock and NoScript (Score:5, Interesting)
Sounds like a reason to just block all double-click items...
I don't enable flash/scripts on any page unless it is needed -- like scripts for
Re: (Score:3)
The viewer / user if presented with Hobson's choice: accept active content, get the desired benefit - while taking the risk; or block active content, be safe, and not get the desired benefit.
If the user wants to view the content and be relatively safe, they can
Re: (Score:2)
The really paranoid admins would never surf from their server, period. For that matter there is also no desktop interface on a paranoid setup. These are potential attack vectos.
If you are that cautions, why not run your browser virtualized? just install a VMWare 'browser appliance' (or if you 'require' a Windows browser, install XP inside of
Re: (Score:3, Insightful)
When you have (inevitably) imperfect software paired with untrusted content providers, there is no guaranteed way to be safe. Which is what makes Doubleclick such a menace - you can't even trust reputable sites an
who is to blame (Score:2, Insightful)
Re: (Score:2)
Ah, let the blame game begin (Score:5, Insightful)
The malware-spiked ads have been spotted on various legitimate websites, ranging from the British magazine The Economist to baseball's MLB.com to the Canada.com news portal.
...and since those sites outsource to Doubleclick, they'll point a finger at them. Doubleclick will no doubt point the finger at some previously-unheard-of company that "solicits advertisements for the Doubleclick network", and they'll point the finger at their "client."
Meanwhile, The Economist, MLB, Canada.com, etc won't take responsibility for the content they present on their website (after all, they chose to use Doubleclick, they chose to put advertisements on the website, they chose not to require approval of ads before they were shown on their website, etc.) Funny how everyone is trigger-happy when it comes to copyright, but when it comes to content they present causing harm, it ain't theirs, eh? :-)
Doubleclick, of course, won't accept responsibility for vetting advertising distributed via their channel (which seems like a standard business procedure for, oh, an advertising network?) The only comfort is the mechanism of the free market: if website users get pissed enough, said websites might put pressure on Doubleclick or leave them altogether. That's bad for Doubleclick business, so maybe Doubleclick will consider vetting ads better, or run checks to see that flash code doesn't do certain things, etc. Then again, if the malicious banner ad suppliers are paying good enough money, Doubleclick may be perfectly happy to issue a press release "apologizing" and keep right on doing business as usual.
Re:Ah, let the blame game begin (Score:5, Informative)
chain of responsibility (Score:5, Insightful)
And speaking of "trigger-happy", you seem to point the finger right back at the Web sites for not inspecting the ads and the underlaying code. Well, that's what they hire DoubleClick for,
And who decided to hire DoubleClick, instead of (as you mention) Google AdSense or a hundred other advertising networks, all of varying reputation, levels of annoying-ness, etc? Who negotiated the terms of the contract, which could have required vetting of ads by Doubleclick? Who had the power to chose between text, GIF, and Flash based ads? Who benefits financially from the presentation of those ads?
So, again tell me who is responsible for ME getting an infected PC visiting that website? If GM makes a car and the wheel falls off because Bob's Bolts sold them defective bolts, I can still sue GM for selling me a car on the reasonable assumption that GM would test bolts before putting them in a hundred thousand vehicles...and GM made the decision to buy from that particular supplier.
The way the world works is: I sue GM. GM then sues Bob's Bolts for damages (ie to reputation, the money they had to give me and spend on legal defense, cost of recall, etc.) Bob's Bolts then may sue Smith's Steel for selling them crappy steel.
Or, in this case: I sue The Economist for infecting my machine. The Economist turns around and sues Doubleclick for providing malicous ads. Doubleclick may then turn around and sue the company that made the malicious ads, for violating the terms of contract with Doubleclick specifying no malicious content...
Yeah sure (Score:3, Insightful)
Re: (Score:2)
Re: (Score:2)
Which is why many of us have elected to employ the nuclear option (FireFox + AdBlock Plus + NoScript) instead of dealing with crap like this. I really don't give a damn about doubleclick or any of their double talk (pun intended). How many more people will choose the nuclear option after reading articles like this? We shall see.
TFA = Site scraping? (Score:5, Informative)
ISP's should block DoubleClick (Score:3, Interesting)
Do it for a month and DoubleClick and their ilk will be extra sure about not hosting bad stuff.
Re: (Score:2)
Wishful thinking. ISP's are far too busy doing IMPORTANT things like going after P2P and torrent users than doing TRIVIAL things like block spam and malicious code.
The Problem is Ubiquitous (Score:2)
If you look at the logs for any web site, you will probably find hits from malw
Not exactly new (Score:5, Informative)
Suddenly windows security center, that I routinely turn off because I can't stand the nagging, started up and told me that my computer was insecure and that I should go to a certain website and buy their virus defender software.
Not very subtle to a savvy person like myself, but I imagine some people would fall for it.
The box also started throwing up connection error message boxes, presumably because my external firewall were blocking outgoing connection attempts. Again not subtle, but it's an uncommon setup for a home user.
Third, it must have rooted the box somehow because certain files became invisible. "test.exe" among them. Renaming a textfile to text.exe would make it disappear, and the folder would be unremovable. Cygwin came to the rescue there. Also I noticed only because I happened to have lots of little crap programs laying around.
The virus scanners did not pick up on this.
This is the only time I have actually contracted a virus. Needless to say I hosed the box (PING is not disk image). What I learned from the experience is that knowing your system is way more effective than a virus scanner, and B) don't trust flash which is how I got the damn thing. I thought I was safe with firefox.
Re: (Score:3, Insightful)
Re: (Score:2)
I just wish they could change it to where it would allow whitelisting of certain domains like noscript does.
At least back to 2004 (Score:2)
Terrible relationships with their advertisers (Score:4, Insightful)
Re: (Score:2)
If they followed a network television model, they would also be held more responsible for the content of the advertising on their sites. I don't work in network television, but my partner does -- coming home from work all the time with *facepalm* stories. They have to be very cognizant of what they put, where, and most espec
Say.. doesn't Slashdot use Doubleclick? (Score:4, Interesting)
Now, granted, the malware distributors typically tag ads for subjects not often seen on Slashdot (but I get them on, e.g., the Sinfest comic - huh, imagine that).
I'd say it's about time Doubleclick (that's you, Google, if you finally get to say you did indeed acquire it and everybody OK'd the deal.) gets held a little more responsible for this sort of thing being done through their network for which they collect money.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Doubleclick sent out a notice Friday (Score:5, Informative)
100it.info, 10smi.info, 2greatfind.com, 2quickfind.com, 3akoh.net, Ad2cash.net, Ad2profit.com, Adcomatoz.com, Adgurman.com, Adhokuspokus.com, Adnetserver.com, Adredired.com, Adsolutio.com, Adtraff.com, Adverdaemon.com, Adverlounge.com, Adzyclon.com, Alg-search.com, Alhoster.com, Aligarx.biz, All-search-it.com, Alphatown.us, Anmira.info, Anonymbrowser.com, Antivirussecuritypro.com, Aptprog.com, Art-earn.biz, Astalaprofit.com, Autodealer-search.com, B2adz.com, Bazaard.com, Belkran.com, Belshar.com, Bestadmedia.com, Best-biznes.info, Best-cools.info, Bestdatafinder.com, Besteversearch.com, Bestpharmacydeals.com, Best-screensavers.biz, Bestsearchnet.com, Bestshopz.com, Bestwm.info, Bestwnvmovies.com, Bezzz.info, Bi-bi-search.com, Bizadverts.com, Bizmarketads.com, Blessedads.com, Bm-redy.com, Bovavi.com, Brandmarketads.com, Bucksinsoft.com, Burnads.com, Cancerno.com, Candid-search.com, Carpropane.com, Cashloanprofit.com, Casinoaceking.com, Casinoby.com, Casinodealsgalore.com, Cha-cha-search.com, Cheap-auto-deals.com, Checkstocklist.com, Chushok.com, Clever-at-search.com, Clubheat.info, Come-from-stars.com, Co-search.com, Creamme.net, Cryptdrive.com, Cyndyk.info, Deuscleanerpay.com, Didosearch.com, Diphelp.biz, Dmitry-v.info, Doma2000.com, Durtsev.com, Easybestdeals.com, Energostroj.com, Enothost.com, Eroticabsolute.com, Errordigger.com, Errorinspector.com, Evrogame.info, Fandasearch.com, Fantazybill.com, Fastwm.info, Fastzetup.info, Fati-gati-search.com, Favourable-search.com, Favouriteshop.com, Feel-search.com, F-host.net, Fifaallchamp.com, Fight-arts.com, Fileprotector.com, Findbyall.com, Firstbestsearch.com, Firstlastsearch.com, First-ts.com, Foamplastic.net, Fokus-search.com, Force-search.com, Forceup.com, Forex-instruments.info, Forvatormail.com, Freepcsecure.com, Freerepair.org, Freetvnow.net, Friedads.com, Fulsearch.com, Getfreecar.com, Gibdd.us, Glass-search.com, Glorymarkets.com, Gosthost.net, Great4mac.com, Greyhathosting.com, Gt-search.com, Hackerpro.us, Hardlinecenter.com, Hebooks-service.com, Hintway-international.com, Homeofsite.com, Hromeos.com, Hyip2all.org, Icq-lot.org, Iddqdmarketing.com, Ideal-search.com, Idea-rem.com, I-forexbank.biz, I-games.biz, Imamis.net, Individ-search.com, Information-advertising.info, Infyte.com, Initial-search.com, Insochi2014.com, Installprovider.com, Internetadaultfriend.com, Internetanonymizer.com, Internetsupernanny.com, Intervarioclick.com, Investmentsgroup.org, Invulnerableads.com, It-translation.biz, Izol-tech.com, Kamerton-tests.com, Kazilkasearch.com, Keytooday.com, Keywordcpv.com, Kiridi.net, Kpoba.net, Kurgan45.info, Ladadc.com, Lanastyle.com, Ldizain.info, Libresystm.com, Liders.biz, Linii.net, Liveclix.net, Loffersearch.com, Londasearch.com, Lovecraft-forum.net, Loveopen.info, Lseom.biz, Luckyadcoin.com, Luckyadsols.com, Mad-search.com, Magicsearcher.com, Mailcap.info, Manage-search.com, Marketingdungeon.com, Mass-send.com, Max-expo.net, Maxyanoff.com, Mediatornado.com, Mega-project.biz, Megashopcity.com, Mightyfaq.com, Misc-search.com, Mobilesoftmarketing.com, Mobiletops.com, Mobilorg.org, Moneycometrue.com, Moneypalacecash.com, Mounthost.net, Myfavouritesearch.com, Myhealth-life.org, Myonlinefinance.com, Mysurvey4u.com, Mythmarketing.com, Mytravelgeek.com, Myusefulsearch.com, Napol.net, Navygante.com, Netmediagroup.net, Netturbopro.com, Newbieadguide.com, Nryb.com, Of-by.info, Olgalml.com, Ol-search.com, Onedaysoft.com, Onestopshopz.com, Onwey.com, Opensols.com, Original-search.com, Osetua.com, Osminog.org, Parischat.org, Passwordinspector.com, Pcsoftw.com, Pcsupercharger.com, Performanceoptimizer.com, Piramidki.com, Podelkin.info, Popadprovider.com, Popsmedia.com, Popupnukerpro.com, Postcity.info, Prenetsearch.com, Prevedmarketing.com, Prizesforyou.com, Pro-dom.info, Propotolok.info, Pro-svet.info, R2d2adverising.com, Radiosfera.net, Rocktheads.com, Roller-search.com, Rombic-search.com, Rus-invest.net, Rusnets.info, Russia-post.com, Sajruen.info, Samson-pro.com, Sauni.net, Se7ensearch.com, Search-and-win.com,
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Over the last several months, website publishers using a variety of platforms have inadvertently served ads that contain malware executables. As we noted in the communication we sent in early October, the ads appear to have originated from small "agencies". These agencies go by a variety of names, and generally claim to be based in Europe or Canada.
Our security monitoring system (active on DART for Publishers, DART for Advertisers and DoubleClick Advertising Exchange) ha
Re: (Score:2)
3akoh.net, Adgurman.com, Adhokuspokus.com, Adzyclon.com, Aligarx.biz, Chushok.com, Dmitry-v.info, Doma2000.com, Durtsev.com, Energostroj.com, Enothost.com, Eroticabsolute.com, Fati-gati-search.com, Fokus-search.com, Gibdd.us, Insochi2014.com, Kazilkasearch.com, Keytooday.com, Kiridi.net, Kpoba.net, Kurgan45.info, Ladadc.com, Liders.biz, Linii.net, Maxyanoff.com, Olgalml.com, Osetua.com, Osminog.org, Piramidki.com, Podelkin.info, Prevedmarketing.com, Propotolok.info, Pro-svet.info, Radiosfera.net, Rombic-search.com, Rus-invest.net, Rusnets.info, Russia-post.com, Sauni.net, Serebro1.info, Sergp.info, Sevna.org, Sotaman.info, Spbcoffee.info, Stolovaya.info, Svadba-buket.info, Svadba-center.info, Svadba-dress.info, Svadba-rings.info, Svadba-scenarii.info, Svadba-toast.info, Svadba-vikyp.info, Vkpb.net, Wape3a.net, Wmbserg.org, Wmolotok.org, Wmrabota.info, X-lave.info, Zappinads.com, Zapsibir.com, Zvukko.net
Old news.. and a very old problem. (Score:2)
Still, griping aside it's good to see this hijack getting a higher profile. However, I had a note from someone who had come across a hijacked banner on Yahoo! just today, so it's clear that the banners are still out there.
Banner hijacks for this type of rich m
Re: (Score:2)
Re: (Score:3, Informative)
hosts file (Score:5, Informative)
http://www.mvps.org/winhelp2002/hosts.htm [mvps.org]
Re: (Score:2)
Some of the less reputable ad networks have already moved to random subdomains to get around this. To fix them I created a that can be matched against multiple domains. [innerfire.net]
I use a flash blocker so I use this zone file on sites where the ads annoy me in spite of me not seeing flash.
And then I can just add each domain I want to block like this. [innerfire.net]
yet another reason... (Score:2)
Adblock, hosts file, iptables, surfing the net with lynx, etc. Pick a method you like and enjoy life without doubleclick.
Why aren't we blaming the browser? (Score:4, Insightful)
Re:Why aren't we blaming the browser? (Score:5, Insightful)
Re: (Score:2)
And for ads posing as dialog boxes, I'd want to see a window manager that ensures the distinction is always clear. If a web page is able to alter the screen to the point that all you see is a "this workstation has been locked, please enter your password" sc
Re: (Score:2)
Doubleclick could fix this in 2 seconds (Score:5, Insightful)
All Doubleclick has to do is require the actionscript source code for all ads. There is *no good reason* for an advertiser to hide anything from doubleclick. Send doubleclick your sourcecode. They will compile it into a
Problem solved.
the common denominator (Score:2)
Popup? Click the red X square. (Score:2)
Google hole that allows a similar attack (Score:4, Informative)
There's a related hole in Google Maps, an "open redirector", that allows this exploit. Here's an example:
Caution - hostile URL Close the page displayed; don't click on anything on it. [google.com].
Note that it fools Slashdot, and most link scanners in spam filters, into accepting the URL as leading to "google.com". But, in fact, it redirects to the "malware-scan.com" hostile site, which will try to install an Active-X control.
We've been finding attacks like this up with SiteTruth [sitetruth.com], by using PhishTank [phishtank.com] information to down-rate sites that have open redirectors. We've found open redirectors on Google and AOL. They're actively being exploited.
So we're currently down-rating Google [sitetruth.com], and AOL. [sitetruth.com]. It may seem drastic to downrate an entire major site because they have a few "minor" exploits. PhishTank itself only blacklists specific hostile URLs. But that's no longer enough. Most modern phishing attacks use a unique URL, and often a unique subdomain, for each user attacked. SiteTruth thus takes a harder line. If a domain hosts something one of the data sources says is an attack, it downrates the whole domain automatically.
It's within the power of the site operator to close such security holes. We encourage them to do so.
Banner attacks started as early as 2004 (Score:2)
Who broke the link? (Score:2)
Is so not a valid url.
In Soviet Russia (Score:2, Funny)
Adding insult to disgust to injury... (Score:5, Insightful)
Here's the rub - when you click on the "Download Now" button, it actually sends you to DoubleClick.net site. Then the DoubleClick.net site redirects you back to the PayPal site and starts downloading the application. If you have DoubleClick.net blocked in your hosts file, like I do, then you can't download the software.
Why?
It is so that DoubleClick.net can plant a first-party cookie, spy on your activities, direct advertisements to you... PayPal has just submitted ALL your information AND the fact that you use PayPal, AND the fact that you purchase stuff online, AND, AND, AND... Then DoubleClick.net can target you for highly targeted advertisements.
This is just unconscionable. PayPal deserves all the flame they're gonna get over this one.
Re: (Score:3, Insightful)
My point is that any trust PayPal had was destroyed the moment they redirected my browser... What else are they doing with my financial information?
Re: (Score:2, Insightful)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
They say they'll be waiting for you in the parking lot.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re:I only found these ads on.... (Score:5, Informative)
Re: (Score:2)
Perhaps you missed the part(s) in the video where he specifically clicked 'CANCEL', and it still scans his PC.
It politely asks you to download and run a trojan.
And asks you...and asks you.. and asks you....
Re: (Score:2, Informative)
And yes, it asks you repeatedly. How is that "directly dangerous?" Annoying, yes (as the OP said), but not directly dangerous (as, once again, the OP said).
Re:I only found these ads on.... (Score:4, Insightful)
Anyone who has done some VB programming, etc is well aware that the labels on dialogue boxes can say most anything and be assigned to most anything - problem here is that most Window's users don't know that "Cancel" can be assigned to the same function as "Yes", etc
Ron
Re: (Score:3, Interesting)
One should click the "X" to close out such windows - or likely better yet, especially when in doubt, do so via keyboard CTRL-F4 (think that's the combo).
And why is it that the close button in the corner is special? It may be the safest because normally it isn't hooked but depending on the situation it could be. Windows sends messages to the program whose window is going to be closed. What's more, an application can draw it's own window decorations (like Winamp does, for example) where the corner bit looks like a normal close but isn't.
Even in a web page, someone can make an image that looks exactly like a default message box on your OS (which can be gue
Re: (Score:3, Informative)
It is 2007!
They now say: "Note: Astalavista.com is NOT affiliated with Astalavista.box.sk, there are NO cracks/serials/keygens/warez etc. hosted on the Astalavista.com's server, and never were! Moreover, Astalavista.com is a security site, therefore requests for anything illegal are simply directed to the wrong party, and get ignored immediately!"
CC.