ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Malvertising: When Advertisements on Legitimate Sites Contain Malware

b2ap3_thumbnail_malvertised_content_400.jpgAny business worth their gigabytes will practice extreme caution when surfing the Internet. Hackers tend to make users’ lives more difficult, even for those who are part of a small or medium-sized business. Teaching your employees security best practices in hopes that they’ll avoid suspicious websites isn’t a foolproof strategy, and thanks to malvertising, ensuring that your organization stays secure is more difficult.

The reasoning is that it’s becoming more difficult to identify potential threats because they can take the form of non-suspicious entities in the online environment. In particular, a new and emerging threat called “malvertising” threatens even the most cautious PC users by injecting malicious code via advertisements. This type of malware often takes advantage of zero-day exploits (mainly with flash) that haven’t been patched by the manufacturer. These kinds of threats are challenging to avoid, even under the best circumstances. For example, check out this malvertising threat described by ComputerWorld:

[...] the source of the infection was a malicious advertisement, one that was running on a mainstream news service! The news website sells ad space served up by an advertising company, which in turn sells that ad space to anybody willing to pay for it. In this case, the bad guys were paying for it. They signed up for ad space just like any other customer, but the advertisement they created — known as “malvertising” — exploited a zero-day (unpatched) vulnerability in Adobe Flash to run commands through the browser to the victim computers’ operating systems, without any knowledge or intervention by the end users.

Taking advantage of the latest cybersecurity measures, like enterprise-level firewall and antivirus solutions, can be great tools to ensure that your organization's network stays secure, but what happens if threats are capable of bypassing these measures? In the above scenario, the malware-fueled advertisement ignored all standard online threat behavior that’s expected of users. The malware needed no user activity, and because it was found on a legitimate site’s ad space, it wasn’t flagged as malicious. In other words, the malware was capable of ignoring the methods used by typical security solutions and employee training, and it managed to infiltrate the system.

Even if malware somehow finds ways to ignore security protocol, there are still ways to identify and resolve problems in a moment’s notice. If you remember anything about cyberthreats, keep this in mind: they will almost always leave some sort of sign that they’re present on your network or workstation. It could be something as simple as decreased network or PC performance, or it could be something a little more obvious. You’ll know if you’re being attacked when your firewall detects viruses or malware attempting to access the network, and phishing emails are blocked by spam filters. Even something as simple as a remote administrator login on your access log can be a giveaway that you’re dealing with a hacker.

Even if malvertising is a new and growing trend, you want to make sure that your network is protected from all threats that can be found on the Internet. Using an enterprise-level security solution like a Unified Threat Management (UTM) tool is capable of limiting your business’s exposure to questionable online entities and maximize threat resistance. To learn more, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Communication Managed IT Services Data Recovery Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Windows 10 Managed Service Apps IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Workplace Strategy Gadgets Artificial Intelligence Managed IT services Networking Windows Spam Server Information Bandwidth Encryption Remote Business Technology App Blockchain Mobile Device Management WiFi Virtualization Office 365 Apple Information Technology History Employee/Employer Relationship Budget Gmail Office Two-factor Authentication Conferencing Access Control Data Security Cybercrime Health BDR Wi-Fi Analytics Big Data Cost Management Hacker Patch Management Document Management Vendor Employer-Employee Relationship Remote Monitoring Compliance Save Money IT Management Remote Computing Help Desk Training Hacking Voice over Internet Protocol Managed Services Money Legal Search... Customer Service Unified Threat Management Firewall Applications Data storage Best Practice Project Management Retail Augmented Reality Vulnerabilities Word Alert IBM Hiring/Firing Website Outlook BYOD Password Computing Data loss Vendor Management Hard Drive Mobile Office Update Twitter Windows 7 Mobile Computing Free Resource Law Enforcement End of Support Marketing Printer How To Data Breach Running Cable Paperless Office Sports Social Antivirus SaaS DDoS Maintenance Storage Windows 11 Travel iPhone Education Cortana Virtual Reality Monitoring Social Engineering Content Filtering Websites Cryptocurrency Black Market Healthcare Mobility Meetings User Cleaning Router Robot Google Maps Scam The Internet of Things YouTube Chrome VPN Remote Workers Laptop Administration Automobile Managed Services Provider Managed IT Digital Virtual Private Network Presentation Downtime Specifications Safety How To Virtual Assistant Microchip IT Consultant Taxes Flexibility Current Events Virtual Desktop Solutions Customer Relationship Management Experience Co-Managed IT Entertainment Processor Hack Identity Theft Notifications Integration Physical Security Images 101 Display Unified Communications Google Docs Disaster Bluetooth Start Menu Employees Distributed Denial of Service Downloads Multi-factor Authentication Avoiding Downtime Office Tips Computer Care Private Cloud Lithium-ion battery Memory Holidays Vulnerability HIPAA Saving Time Software as a Service Cooperation Data Protection Processors Video Conferencing Politics Machine Learning Computers Settings Bitcoin Virtual Machines Telephone Computer Repair Solid State Drive Professional Services Excel Chromebook Tech Terms Drones Wireless Technology eWaste PowerPoint Windows 8 Fileless Malware Financial Data Be Proactive intranet Tip of the week Company Culture Electronic Payment Web Server Wireless Risk Management Gamification Shortcut IT Telephone System Heating/Cooling Relocation SharePoint Regulations Environment Displays Advertising Digital Payment Google Apps Tech Support Worker Windows XP Directions Telework Workplace Strategies Backup and Disaster Recovery Social Networking Work/Life Balance Desktop Microsoft 365 Access Phone System Smartwatch Content Communitications Electronic Medical Records Procurement Accountants Time Management Public Cloud FinTech In Internet of Things Database IT Assessment Hacks Audit Network Congestion Spyware CES Health IT Supply Chain Management Reliable Computing Equifax Value Writing File Sharing Computer Accessories Organization Smart Technology Tactics Cyber security Redundancy Hard Drive Disposal Username Smart Devices Cache Staffing IP Address Remote Working Scalability Startup Unified Threat Management Freedom of Information Workers email scam Proactive IT Navigation AI Administrator Addiction Trend Micro Text Messaging Electronic Health Records Bring Your Own Device Printing Mobile Security Transportation CCTV Digital Security Cameras User Tip Legislation Wasting Time Touchscreen News Modem Music Computer Malfunction Evernote Supply Chain Network Management eCommerce Emergency Competition Surveillance Vendor Mangement Recovery Videos Troubleshooting Proxy Server Emails Managing Costs Fake News Samsung Computing Infrastructure SSID Uninterrupted Power Supply LiFi Webcam Botnet Workplace Service Level Agreement Entrepreneur Management Application Development Rental Service Device security Employer/Employee Relationships Micrsooft Business Mangement Documents Media Wireless Headphones Business Intelligence Virtual Machine Flash Microsoft Excel Tablets Business Cards Business Growth Tech Reviews Scams Going Green Optimization Telephone Systems Error Google Calendar Teamwork Supercomputer Securty 2FA Business Owner Bookmark Domains Data Storage Hypervisor Virus Piracy Medical IT Google Wallet Motion Sickness Term Shopping Cables Download Banking Messenger Comparison HTML SQL Server Deep Learning Google Drive Paperless Browsers PCI DSS Nanotechnology Licensing Business Metrics Knowledge Software License Hosted Solution Corporate Profile Google Play Gig Economy Point of Sale Upload Humor Social Network Public Speaking Internet Service Provider Books Television Azure Telephony Employer Employee Relationship Business Communications Society Cabling Inbound Marketing Streaming Media Data Analysis Regulations Compliance Shortcuts Screen Reader Managed IT Service Language Mobile Technology Tablet G Suite Security Cameras Trends Keyboard Memes Customer Resource management Hard Drives Net Neutrality Reading Mouse Devices Monitors VoIP Visible Light Communication Tracking Human Resources

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?