Massive Malvertising Campaign Shut Down by Cisco and GoDaddy

Exterminator

Level 85
Thread author
Verified
Top Poster
Well-known
Oct 23, 2012
12,527
A malvertising campaign that affected users all over the globe was recently brought to a halt following the cooperation between Cisco Talos and GoDaddy.

Every day there are tens of different cyber-crime campaigns affecting users. Just to name a few, we have AdGholas, EITest, VirtualDonna, GooNky, Darkleech, Pseudo-Darkleech, wordJS, and more.

Behind these campaigns are cyber-crime groups that hack websites and/or create malicious ads in order to drive traffic (users) to special servers called "gates."

These gates check the user's browser and OS, and if certain criteria is met, they redirect him to another server called the "landing page" where an exploit kit tries to infect the user with malware by using vulnerabilities in the outdated software detected by the gates.

ShadowGate crew targeted OpenX and Revive advertising servers
One of these cyber-crime campaigns that hijacks users from their regular web browsing experience is run by the ShadowGate crew, named this way because they use domain shadowing to host their activity.

Cisco researchers say that they've tracked down several campaigns carried out by this crew, which leveraged ads hosted through the OpenX and Revive advertising platforms.

The ShadowGate crew buys ads on advertising platforms that deployed OpenX and Revive advertising servers, which would allow them to add JavaScript code together with their advertisements.

ShadowGate campaign pushed CrypMIC ransomware
When these ads would show inside a user's browser, they would load a hidden iframe, which in turn would load a JavaScript file hosted on the gate, which was usually a shadow domain on a hacked website (malicious_subdomain.hacked_website.com).

This script would test the user for the usual gate-level checks, and if everything checked out, would load a Flash file from the exploit kit landing page, compromising the user with malware.

In most cases, this malware was the CrypMIC ransomware, as in the video below, and would not require any type of interaction from the user.

 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top