ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Malvertising: When Advertisements on Legitimate Sites Contain Malware

b2ap3_thumbnail_malvertised_content_400.jpgAny business worth their gigabytes will practice extreme caution when surfing the Internet. Hackers tend to make users’ lives more difficult, even for those who are part of a small or medium-sized business. Teaching your employees security best practices in hopes that they’ll avoid suspicious websites isn’t a foolproof strategy, and thanks to malvertising, ensuring that your organization stays secure is more difficult.

The reasoning is that it’s becoming more difficult to identify potential threats because they can take the form of non-suspicious entities in the online environment. In particular, a new and emerging threat called “malvertising” threatens even the most cautious PC users by injecting malicious code via advertisements. This type of malware often takes advantage of zero-day exploits (mainly with flash) that haven’t been patched by the manufacturer. These kinds of threats are challenging to avoid, even under the best circumstances. For example, check out this malvertising threat described by ComputerWorld:

[...] the source of the infection was a malicious advertisement, one that was running on a mainstream news service! The news website sells ad space served up by an advertising company, which in turn sells that ad space to anybody willing to pay for it. In this case, the bad guys were paying for it. They signed up for ad space just like any other customer, but the advertisement they created — known as “malvertising” — exploited a zero-day (unpatched) vulnerability in Adobe Flash to run commands through the browser to the victim computers’ operating systems, without any knowledge or intervention by the end users.

Taking advantage of the latest cybersecurity measures, like enterprise-level firewall and antivirus solutions, can be great tools to ensure that your organization's network stays secure, but what happens if threats are capable of bypassing these measures? In the above scenario, the malware-fueled advertisement ignored all standard online threat behavior that’s expected of users. The malware needed no user activity, and because it was found on a legitimate site’s ad space, it wasn’t flagged as malicious. In other words, the malware was capable of ignoring the methods used by typical security solutions and employee training, and it managed to infiltrate the system.

Even if malware somehow finds ways to ignore security protocol, there are still ways to identify and resolve problems in a moment’s notice. If you remember anything about cyberthreats, keep this in mind: they will almost always leave some sort of sign that they’re present on your network or workstation. It could be something as simple as decreased network or PC performance, or it could be something a little more obvious. You’ll know if you’re being attacked when your firewall detects viruses or malware attempting to access the network, and phishing emails are blocked by spam filters. Even something as simple as a remote administrator login on your access log can be a giveaway that you’re dealing with a hacker.

Even if malvertising is a new and growing trend, you want to make sure that your network is protected from all threats that can be found on the Internet. Using an enterprise-level security solution like a Unified Threat Management (UTM) tool is capable of limiting your business’s exposure to questionable online entities and maximize threat resistance. To learn more, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Microsoft Office Smartphones Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Apps Windows 10 Managed Service IT Support Browser Cloud Computing Outsourced IT Miscellaneous Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Artificial Intelligence Gadgets Managed IT services Workplace Strategy Networking Windows Spam Blockchain Server Bandwidth Information Remote Encryption Mobile Device Management WiFi Business Technology App Virtualization Information Technology Office 365 History Budget Employee/Employer Relationship Gmail Office Apple Two-factor Authentication Access Control Conferencing Data Security Health Cybercrime Wi-Fi Analytics BDR Big Data Document Management Hacker Save Money Employer-Employee Relationship Patch Management Compliance Remote Monitoring Vendor Remote Computing Help Desk Hacking Cost Management IT Management Voice over Internet Protocol Training Managed Services Legal Data loss Search... Data storage Money Best Practice Customer Service Unified Threat Management Retail Firewall Alert Augmented Reality Word Project Management Hiring/Firing Applications BYOD IBM Outlook Password Website Computing Vulnerabilities Vendor Management Hard Drive Mobile Office Free Resource Law Enforcement Mobile Computing End of Support Laptop Printer VPN Marketing How To Running Cable Update Storage Social Sports Travel SaaS DDoS Virtual Reality Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Data Breach iPhone Cleaning Maintenance Education Cortana Robot User Content Filtering Windows 11 Websites Router Monitoring Chrome Meetings Mobility Healthcare The Internet of Things YouTube Remote Workers Twitter Google Maps Scam Windows 7 Virtual Private Network Wireless Technology Microchip Presentation eWaste Telephone Flexibility Specifications IT Consultant Current Events Downtime Tech Terms Hack Safety Identity Theft Customer Relationship Management Excel Solutions Notifications Managed IT Co-Managed IT Digital Unified Communications Entertainment Virtual Desktop Integration Images 101 Experience Display Google Docs Bluetooth Taxes Distributed Denial of Service Virtual Assistant Office Tips Memory Employees Private Cloud Avoiding Downtime Disaster Physical Security Holidays Processor HIPAA Politics Settings Cooperation Lithium-ion battery Machine Learning Video Conferencing Start Menu Virtual Machines Computer Care Solid State Drive Downloads Computer Repair Processors Vulnerability Multi-factor Authentication Professional Services Chromebook Software as a Service Drones Data Protection Automobile Saving Time PowerPoint Administration Managed Services Provider How To Computers Bitcoin Term Google Apps Download Piracy Keyboard Hard Drives Corporate Profile Telework Knowledge HTML In Internet of Things Television Nanotechnology Communitications Telephony Phone System Microsoft 365 Cables intranet Employer Employee Relationship Browsers Smartwatch Google Play Upload Procurement Wireless Hacks Software License Shortcut Network Congestion Cabling Heating/Cooling Writing Tablet Environment G Suite Social Network FinTech Reliable Computing Windows XP Mouse Screen Reader IT Assessment VoIP Point of Sale Social Networking Tracking Data Analysis CES Security Cameras Trends Supply Chain Management Mobile Technology Value Computer Accessories Shortcuts Web Server Customer Resource management Organization Scalability Devices Cyber security Administrator SharePoint Smart Devices Text Messaging Tip of the week Proactive IT Digital Payment Fileless Malware Gamification Remote Working Bring Your Own Device Company Culture Worker Access Be Proactive Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Time Management Transportation Music Public Cloud Directions Digital Security Cameras Content Staffing Desktop Wasting Time IP Address Spyware Modem Workplace Strategies Electronic Medical Records Audit Accountants eCommerce Botnet Database Surveillance File Sharing Videos Rental Service Redundancy Troubleshooting Managing Costs Micrsooft Flash Cache SSID Health IT Equifax Media Tactics Development Telephone Systems Unified Threat Management Hard Drive Disposal Employer/Employee Relationships Business Growth Workers Username Recovery Virtual Machine Competition Startup Optimization Freedom of Information Smart Technology CCTV Reviews Printing Navigation 2FA LiFi Addiction Banking Touchscreen email scam Teamwork Entrepreneur Google Wallet Computer Malfunction Data Storage Documents Messenger Emergency Business Owner Mobile Security Hypervisor Application Deep Learning Legislation Vendor Mangement News Medical IT Business Intelligence User Tip Shopping Evernote Paperless Network Management Business Metrics SQL Server Hosted Solution Samsung Webcam PCI DSS Securty Books Licensing Uninterrupted Power Supply Emails Humor Domains Language Business Mangement Fake News Supply Chain Society Proxy Server Gig Economy Business Communications Service Level Agreement Internet Service Provider Computing Infrastructure Azure Tablets Visible Light Communication Management Regulations Compliance Reading Inbound Marketing Device security Managed IT Service Monitors Google Calendar Wireless Headphones Memes Microsoft Excel Workplace Windows 8 Supercomputer Tech Human Resources Going Green Net Neutrality Virus Business Cards Public Speaking Displays Advertising Motion Sickness Error Financial Data Relocation Streaming Media Comparison Electronic Payment IT Work/Life Balance Google Drive Scams Tech Support Bookmark Risk Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?