If you are looking to protect your advertising business in this blog post we aim to show you how to choose an ad quality solution.Continue reading
The UK was in second place for GEOs that malvertisers attacked in 2021, check out our ad security and quality statistics.Continue reading
Ad Platforms don’t take enough action to eliminate malvertising before it ends up on a Publisher’s site, here are 5 things that Ad Platforms need to know about bad ads.Continue reading
How AdSecure eliminated Malware attacks and ensured a 95% decrease in Browser Locker and forced redirect attacks for client Traffic Factory.Continue reading
AdSecure's Bryan Taylor will be virtually attending Internext from the 10-11 February 2021.Continue reading
How to build the right strategy against threats, poor user experience issues and get insights into ad performance to ensure you show high quality ads.Continue reading
While many digital ad campaigns today are delivered using HTTPS for primary resources, non-secure HTTP subresources can still be present and will be blocked on websites in Chrome.Continue reading
Some publishers are employing an expensive non-technical solution to try to stop malvertisers: Hedging.Continue reading
Find out how Merle helps clients get the most out of AdSecure's platform.Continue reading
This new integration is designed to drive a more secure digital advertising ecosystem for clients of both companies.Continue reading
Within the digital advertising ecosystem the challenge of securing ad creatives against malicious threats has historically taken a back seat to the bigger, “louder” problem of ad fraud. The impact invalid traffic has on the digital supply chain is often easier for stakeholders to get their heads around, leaving malvertising as a “quiet” problem that has allowed threat actors to fly under the radar and profit from the ensuing damage.
In 2015 an IAB report found an overall US$1.1 billion cost impact on digital advertising from malvertising attacks. Despite being less immediately visible, the problem of creative compliance is not new, and since 2015 attacks have scaled in lockstep with the digital ad ecosystem.
That’s the bad news. The good news is that awareness of the problem – and the resolve to fight it – has also grown. The quiet problem is finding its voice.
With programmatic exchanges making creative compliance a key pillar of their programmatic principles, and Google taking a near zero tolerance approach to abusive ads with the launch of Chrome 71, the focus on delivering clean, compliant creatives has sharpened dramatically. For publishers — and the networks and exchanges they partner with — the cost of inaction will soon become too high to ignore.
AdSecure has identified 3 problems that we expect to trend throughout 2019 and the best solutions to face them head on, and win.
Programmatic & Mobile ad spend: threat actors follow the money
The rise of programmatic ad spend continued throughout 2018, and in 2019 an estimated 65% of all money spent on digital ads will be traded programmatically. Advertisers will spend US$84 billion on programmatic advertising this year, and by 2020 the total is expected to rise to US$98 billion. The money flowing programmatically is massive, and there’s one certainty when discussing malicious activity: follow the money.
More money, more malicious problems. Everything swells in programmatic, creating an ideal breeding ground for dangerous attacks. With publishers losing visibility and control over exactly who is buying traffic, the question of facing malicious activity becomes a matter of when, rather than if.
Similarly, mobile ad spend comprised a staggering 75% of all digital ad spending in 2018, and that growth will continue in 2019. The amount of money involved in mobile advertising is like catnip for criminals. In November 2018, a malware campaign targeting iOS devices managed to hijack an astounding 300 million browser sessions within 48 hours. The culprit behind that attack is still active today.
The AdSecure Solution:
For publishers, negating the damage wrought by malvertising attacks on programmatic campaigns means taking back control to protect both visitors and the revenue streams that fuel the creation of new, engaging content. Trusted partners that embrace the need for transparency and a commitment to delivering clean, malware free programmatic campaigns are a must.
Working with partners who collaborate with dedicated ad verification vendors capable of scanning programmatic campaigns to detect malicious attacks is the best solution. Should ad networks and exchanges not show a willingness to provide that solution, publishers can take on a dedicated service directly, and possibly reconsider their future partner relationships.
With the power mobile campaigns hold in today’s digital advertising landscape, particularly those campaigns running on carrier networks, an anti-malvertising provider that enables their clients to scan campaigns across a global mobile carrier proxy network is key, as is being sure that you decide which campaigns are scanned using mobile carrier proxies, and the frequency. Control needs to be in your hands.
Ad Cloaking & IP Blacklisting: sleight of hand from cyber criminals
Threat actors are clever, and quite inventive when it comes to bypassing ad operations teams searching for bad ads. In order to avoid scrutiny, or risk their attack being stopped before the damage can be done, criminals often resort to ad cloaking via IP blacklisting. Once they have identified those IPs they want to avoid, they are added to a blacklist, which will then present the flagged IPs with a clean ad while the dangerous content creeps along to the intended target.
Some schemes go so far as blacklisting all standard datacentre proxies in a target location, making it difficult for a scanning solution that relies on these proxies alone to detect cloaked attacks. In this scenario, even a dedicated verification tool will be fooled into allowing dangerous attacks to slip through.
The AdSecure Solution:
What if you could take from cyber criminals their ability to know just which IPs to blacklist, but also nullify the benefits of blacklisting altogether? It’s entirely possible with the right approach to proxy coverage. Scanning ad creatives using an intricate network of Residential IPs makes it virtually impossible for an attacker to determine which IPs to blacklist, while making it counterproductive to do so, as these IPs belong to the very users they are looking to target.
Ad cloaking is a growing concern for many ad networks looking to protect their reputations for clean ad delivery and instill confidence in their publishing partners, but with an innovative approach to proxy usage it’s a concern that they can safely say they have covered.
Cryptojacking: a drain on (other people’s) resources
Cryptojacking is growing because it’s easy money and relatively simple to use, even for those low on tech savvy. Cryptojacking is seen as less risky and more profitable than ransomware as it continuously generates income. It is also far more difficult to uncover than ransomware, lowering the fear of being caught.
One way to implement a cryptojacking program is by injecting a script into a digital ad or website. Once a user visits the infected site, or encounters the ad carrying the cryptominer the script is executed, leaving the user blissfully unaware.
This differs from typical malvertising attacks as there is no obvious damage to the user. It does, however, put a massive drain on the CPU of the users device. For individuals this can be annoying, but for a large organisation infected by a cryptojacking script, the costs of detecting and resolving performance issues, or replacing equipment can have a detrimental impact.
The AdSecure Solution:
Scan your creatives early, and often. When looking at dedicated solutions for scanning ad campaigns and detecting suspicious behaviour, a tool that gives you the ability to scan in large volumes will be most effective in protecting users from falling victim to a cryptominer that kills their devices over time.
One final thought: The importance of transparency and trust in your ad tech partners
Digital is unique in that the seller of traffic is responsible for what appears on their site, so ultimately it’s the publisher who gets the blame when something malicious is delivered to their visitors. That duty of care to the consumer means working with partners who understand the weight of that responsibility.
Transparency and trust are key in safeguarding users from harm. Partnering with compliance experts who bring a full spectrum approach to tackling malicious activity, and know that rather than holding control over protection tools and obscuring when they are used — and how often — it’s through empowering clients to take back control of ad creative quality that will ultimately lead to the creation of a secure digital advertising ecosystem.
AdSecure provides creative security solutions that empower our partners to take back control and keep their ads safe. We provide solutions for programmatic & mobile campaign scanning, and robust protection against ad cloaking & IP blacklisting via our innovative residential proxy model. Click here to learn more.
2018 is drawing to a close, and before we know it, 2019 will kick off in full swing, bringing with it new challenges and new opportunities. 2018 marked the launch of an amazing journey for our ambitious project. We overcame challenges, discovered new opportunities for growth, and drove our mission forward to empower our partners in the digital ad space to act with confidence and control when facing malicious activity.
With the holidays fast approaching, the AdSecure team thought it was a good time to take a look back at some of our 2018 highlights, and a few quick (spoiler free) hints at what’s coming for 2019.
Cyber criminals are always looking for new methods to advance the spread of – and to profit from – malicious activity. At AdSecure we decided to tackle ongoing bad guy innovation with the mindset of continuing to evolve and adapt to stop criminals from ruining the experience of user’s looking to engage with great content.
In December 2017 we first introduced our innovative approach to combat cloaking and IP blacklisting techniques with our intricate network of standard, residential, and mobile carrier IPs spread around the globe. In 2018 we picked up right where we left off, adding new locations to expand the scope of our coverage, including Australia, Greece, Nigeria, South Africa, Taiwan, and United Arab Emirates to name a few.
Throughout the year we also continued to enhance the level of protection we provide for our partners. In 2018 we added scanning & support for:
- SSL non-compliant
- Push ads
- Programmatic RTB Campaigns
- Click-on banner
- Native ad protection
AdSecure will continue evolving and adapting to face the newest, and most dangerous, digital threats as they surface by adding new locations, tools, and ad format protections throughout 2019.
Taking the show on the road
In 2018, AdSecure stepped out into the adtech world and officially announced our arrival as a new, ambitious start up with the goal of building a safer digital advertising ecosystem by bringing clarity, simplicity, and innovation to the ad creative verification process.
We chose to introduce ourselves at two of the biggest media shows in Europe. In both cases, it was an amazing experience for us, and we can’t wait to make an even bigger splash in 2019!
Mobile World Congress 2018
Most of the AdSecure team live and work in beautiful Barcelona, so attending Mobile World Congress – the world’s largest mobile tech conference – was a no-brainer for us. The chance to introduce ourselves to stakeholders in the mobile advertising space and learn what is most important to them when it comes to keeping their campaigns compliant and malware free — and develop our solution informed by their insights and experiences — was invaluable.
Arguably the most important conference on the digital marketing calendar, at DMEXCO18 in Cologne we took to the stage, quite literally, as a first time exhibitor, joining some of the biggest ad networks, exchanges, and ad tech companies out there. The DMEXCO experience is exhilarating and at times overwhelming, but ultimately completely unforgettable.
Over the 12th & 13th of September we had an amazing time discussing the key issues companies face when it comes to tackling malicious activity and compliance challenges, and showing them how we can help keep their ads safe with our innovative approach to ad creative security. We also took the opportunity to announce the end of our platform beta, and the countdown to our full platform launch! In addition to having high quality conversations, we met fantastic people, and sparked great new relationships that led to strong partnerships in the months following.
As a DMEXCO freshman myself, for anyone out there in the digital world considering attending for the first time in 2019, take it from me: the experience cannot be beat. See you at DMEXCO19!
Setting the stage for 2019
Over the past few months our brilliant development team have been working hard to bring the new AdSecure user interface to life, in order to provide our partners with a robust, powerful, and easy to use platform that both protects their ad creatives from myriad threats, and helps them regain control of their digital landscape.
In November the team completed this goal, and we were delighted to announce the launch of our full AdSecure platform, both to our current partners, and future partners we are excited to work with in the coming years. Now, as we close 2018, our team is busy finalising work on the next key new addition to AdSecure, a real-time threat response tool which will allow our users to block malicious domains before they have a chance to damage – either to their own business, or that of their trusted partners.
For those who have been following us throughout 2018 — either as a collaborator, or as someone curious to learn more about us — we hope you’ve enjoyed the journey as much as we have. To all our clients who showed confidence and trust in the work we are doing, and helped us grow in leaps and bounds this year, we want thank you for trusting us to keep your ads safe.
We also want to let you know that we have some big plans for 2019. We intend on starting the year on a high note straight away, with the announcement of a great new partnership, which we will tell you all about… next year! Watch this space.
What is a banner?
A banner ad, also known as a display banner, is an online advertising format that is typically a designed visual or an image accompanied by text or a call to action. When an end user clicks on the banner he is redirected to a landing page for the advertiser’s offer.
Why do cybercriminals target this format
Cybercriminals seek to take advantage of both display advertising and related ad landing pages to distribute multiple forms of malicious content, by leveraging the ad ecosystem to their advantage. The ad industry is a complex and powerful machine and with the growth of programmatic advertising, where the buying and selling of advertising is carried out automatically in real time, this can lead to a loss of control of the security of ads being served by ad exchanges and ad networks. The rise of programmatic advertising is helping to fuel the robust growth in malvertising. By replacing human decision making for the purchasing and placement of advertising with software in a machine to machine ecosystem, there are new opportunities for criminals to exploit display advertising to distribute malware and hide malicious code within a banner ad.
The banner is still one of the most used ad formats and because of its sheer global volume, the reach and exposure cybercriminals can achieve once they get a banner containing their malicious code to slip through the net, can be huge.
How do they do it?
Some of the most common ways criminals spread malicious banners include:
- Malicious code hidden within the ad creative, which is enabled only once the campaign has been approved by an ad platform.
- By compromising trustworthy and legitimate advertiser accounts on ad platforms.
- The creation of fake identities (skype, linkedin…) in order to mislead someone in the ad chain.
- Targeting high profile publishers rather than multiple low profile ones to maximize their exposure with a single rogue campaign.
- Taking advantage of the naivety of end users, who mistakenly often think they need to actually click on a malicious ad to get infected
What examples has AdSecure seen of malicious advertising using this format?
Nowadays, the most common violations with banners are auto-redirects: when an infected ad is effectively being displayed on a publisher’s website, it can get to a point where the iframe will take over control of the website and redirect the visitors to malicious landing pages (containing social engineering content, or even worse, exploit kits).
Additionally, banner ads can show inappropriate content, for example, a banner containing adult material being displayed on mainstream or even children’s websites, or the image and text of a banner ad that has been designed to mimic genuine warning alerts generated by computer security software.
What is the solution?
AdSecure helps ad platforms and publishers regain control and confidence by offering an ad quality solution capable of scanning, analyzing and detecting malicious and non-compliant ads and their related landing pages.
If you would like to find out more about incorporating AdSecure into your business, please visit our contact page for more information.
With its latest release of version 68, the Chrome browser is now labelling as “Not Secure” all HTTP (unencrypted) websites.
As stated on their security blog Google explains that:
“For the past several years, we’ve moved toward a more secure web by strongly advocating that sites adopt HTTPS encryption. And within the last year, we’ve also helped users understand that HTTP sites are not secure by gradually marking a larger subset of HTTP pages as “Not Secure”
The Chrome 68 omnibox will now show the “Not Secure” label for all HTTP pages, instead of the small “i” icon. This label will not only highlight the unsecured nature of the HTTP pages but will also push publishers to move over to HTTPS from HTTP.
To help drive adoption of a more secure internet, AdSecure is adding a new detection feature on its platform: “SSL non-compliant”. This new feature will help ad-platforms and publishers detect HTTPS banner tags which are loading HTTP resources that lead to generating mixed content errors on the publishers’ websites. Such a problem can cause information leakage, hence the importance of monitoring ad tags.
Here are the different elements AdSecure checks when analyzing the banner tags for SSL compliance:
- Ensuring that the SSL and certificate version match
- Flagging suspicious certificates: expired, revoked, untrusted (based on CA), self-signed
- Checking mixed-content for externally loaded resources (scripts, css, img, etc…)
- Detecting invalid CAs
- Verifying protocol and cipher strength to reduce the risk of information leakage
AdSecure provides next-gen defenses that protect publishers and ad platforms against a wide range of attacks. To test how AdSecure can help your organization detect, investigate and respond to advanced malvertising attacks, sign up for a free trial.
In this three part series we look at popular ad formats that can be corrupted with Malware. In part one we look at Popunders.
What is a Popunder?
Why do cybercriminals target this format?
Because Popunders usually remain unnoticed until the active browser window is closed or minimized, the user may not notice the advertisement/malvertisement for a while. Usually an ad networks Compliance team’s approval process for Popunders is less strict than for other ad formats because ad networks offering this format tend to be more flexible, for example this format is not available on Google.
How do they do it?
The cybercriminal will submit a ‘clean’ Popunder to an ad network during the review process. Once approved the cybercriminal can then inject malware script into the Popunder. Many cybercriminals will inject the malicious code for a limited time to avoid detection of the Popunder’s content change.
What examples has AdSecure seen of malicious advertising using this format?
Our system has detected the following malicious advertising on Popunders:
- Malicious/Phishing URLs
- Malware downloads (including ransomware)
- Browser Lockers
AdSecure’s advanced crawler technology can detect changes in a Popunder’s content that is injected with Malware. Contact us to find out how we can protect your users and keep your advertising safe.
Online advertising is a booming industry with over 204 billion dollars spent on advertising worldwide in 2017. Countless websites use advertisements to pump up their earning power and recommend useful products and services to their visitors. But many website owners fail to consider the security of their ads, leaving consumers open to risk. Here’s what you need to know to keep your ad platform secure.
What is a Secure Ad Platform?
As a consumer, how many times have you been surfing the internet, reading a news article, or making a purchase when an ad blocks your view? Often, malware ads pop up and refuse to go away, forcing you to close your browser or app to get rid of them.
As Fast Company reported in early 2018, these malware ads negatively influence the consumer experience. In fact, even big-name websites like The New York Times and The Atlantic have fallen victim to malware ads that hinder users’ ability to read and interact with articles.
The bad news is, although these ads may appear to be publisher-run material, it’s difficult for sites to find the source and remove them. As top-tier publishers are finding out, a secure ad platform is crucial for both consumer trust and a dependable income stream.
Consider the fact that malicious auto-redirect ads have cost publishers and marketers over $1 billion, according to Fast Company’s expert. Smaller businesses stand to lose a proportionate amount of their income as well if malware continues to dominate the internet.
In contrast with the spammy pop-up ads that many users run into, a secure ad platform maintains only legitimate and scam-free advertisements. This protects your audience and your reputation as a business or website owner.
A secure platform can also notify website owners of potential problems. Scanners and subsequent reports inform you when ads and landing pages are out of compliance with your specifications so that you can avoid exploit-kit based and other attacks.
Even if you don’t have secure ad software to do the work for you, there are still steps you can to recognize and mitigate security risks.
Security Red Flags to Watch For
Filtering out legitimate versus malware ads without software involves thoroughly checking your website and files for signs of “infection.” From viruses to Trojan software, there’s a lot that can hide in advertisements.
On the back end of your website, keeping an eye out for unauthorized code changes can help you catch malware before it wreaks havoc. Often, spam ads “hack” into your website’s code and cause annoying and potentially viral popup ads.
Unfortunately, because these malware ads are attempting to go unnoticed, they can be hard to identify. However, some programs scan your code and automatically make backup files. You can do this manually, too, with a bit of general coding knowledge.
Sluggish Site Behavior
While you may be more concerned with what’s happening behind the scenes on your website, it helps to visit your website the way your audience does. This way, you can gauge your site’s loading speed. The longer it takes to load, the more likely there’s a problem with your ad platform.
Visiting your website from the front end will also show you any malware that’s currently active. If you experience popup ads when you load your site, you’ll know you need to take a closer look at the administrative end.
How to Stay Secure with Ads
While it can be hard to get rid of malware ads once they infiltrate your site, some simple preventative measures can help avoid them in the first place. Here are a few ways to stay secure with ads.
Use Secure Hosting
Depending on your business model, you may look for the least expensive hosting option available. But according to InfoWorld, hackers tend to target shared hosting servers. Because shared Web hosting servers host multiple domains, their information stores give hackers tons of information for phishing.
The alternative to shared server hosting is dedicated hosting, which often costs more but allows you more control over your server. You can also add extra security precautions that prevent hackers from readily accessing your information.
Run Malware Checks
Scanning your ad tags and landing pages for any issues can help identify malware before it takes over your website. You can also run checks from more than one browser, device, or location to ensure that everything is running smoothly.
Keep Things Simple
Overall, the more features on your website, the more likely you will fall victim to security breaches. That’s because complex code can hide malware codes more effectively, meaning you may not notice a website malfunction until a user reports it. At that point, you may have lost revenue already.
Trimming down the features on your website can help reduce your odds of falling victim to hacking, but that doesn’t mean you have to forgo interactive features that your customers will find useful.
PixelPrivacy.com is all about making the world of online security accessible to everyone. Check out Pixel Privacy’s blog if you’re interested in keeping your private information just that: Private!
AdSecure’s platform is the intelligent defense against malvertising. If you are a publisher or an ad network our software will alert you when malware is being served on your website or network and keep all of your advertising safe. Contact us for a free trial