Doubleclick Involved in Malware Distribution

Keep on Guard!


We recently reported on thousands of people being hooked by big sites distributing malware, it now seems Doubleclick was the one at fault.

It’s a pretty neat trick and a good spin on Social Engineering leveraging on the trustworthy nature of the sites.

CNN even?

Rogue anti-spyware software that pushes fraudulent PC scans has found its way onto DoubleClick and legitimate sites, including CNN, The Economist, The Huffington Post and the official site of the Philadelphia Phillies.

DoubleClick officials told eWEEK that they have recently implemented a security monitoring system to catch and disable a new strain of malware that has spread over the past several months. This system has already captured and disabled about 100 ads, the company said in a statement, although it didn’t mention this episode in particular.

The bogus anti-spyware onslaught is only part of a bigger wave that’s also included porno ads being swapped for normal ads on sites such as The Wall Street Journal. It’s not yet clear whether the same fraudsters are behind both the porn and the fraudulent anti-spyware ads.

I really hope they do put some serious measure in place that don’t just use a signature for this particular case…something a little more intelligent I hope.

Sunbelt Software has confirmed that Trojans were being downloaded from ads served by DoubleClick as recently as Nov. 11. This malware is the kind that repeatedly pops bogus warning messages about computer infections in users’ faces until they give up in despair and pay $30 to $40 for a junk “security” program.

“The stuff that’s installed is this rogue anti-spyware software that … gives you fake alerts, [such as] ‘Your computer is infected, you must run this.’ Basically it’s extortion. … They try to push you to buy their software,” Sunbelt President Alex Eckelberry told eWEEK.

The malware application is a variant on WinFixer, a piece of malware that pretends to be a diagnostic tool.

I hope we can educate people about these kind of things, sad to say as some of the comments mentioned in the previous post…a lot of people will fall for this – why? Simply because they don’t know any better.

Source: eWeek

Learn about Malware



Posted in: Malware, Social Engineering

Latest Posts:


AWSBucketDump - AWS S3 Security Scanning Tool AWSBucketDump – AWS S3 Security Scanning Tool
AWSBucketDump is an AWS S3 Security Scanning Tool, which allows you to quickly enumerate AWS S3 buckets to look for interesting or confidential files.
nbtscan Download - NetBIOS Scanner For Windows & Linux nbtscan Download – NetBIOS Scanner For Windows & Linux
nbtscan is a command-line NetBIOS scanner for Windows that is SUPER fast, it scans for open NetBIOS nameservers on a local or remote TCP/IP network.
Equifax Data Breach - Hack Due To Missed Apache Patch Equifax Data Breach – Hack Due To Missed Apache Patch
The Equifax data breach is pretty huge with 143 million records leaked from the hack in the US alone with unknown more in Canada and the UK.
Seth - RDP Man In The Middle Attack Tool Seth – RDP Man In The Middle Attack Tool
Seth is an RDP Man In The Middle attack tool written in Python to MiTM RDP connections by attempting to downgrade the connection to extract clear text creds
dcrawl - Web Crawler For Unique Domains dcrawl – Web Crawler For Unique Domains
dcrawl is a simple, but smart, multithreaded web crawler for randomly gathering huge lists of unique domain names. It will branch out indefinitely.
Time Warner Hacked - AWS Config Exposes 4M Subscribers Time Warner Hacked – AWS Config Exposes 4M Subscribers
What's the latest on the web, Time Warner Hacked is what it's about now as a bad AWS S3 config (once again) exposes the details of approximately 4M subs.


6 Responses to Doubleclick Involved in Malware Distribution

  1. normalsecrecy November 15, 2007 at 8:16 pm #

    i wonder if it would be too much trouble for some of the consumer grade security software providers (mcafee, symantec) to enhance their products to block adservers like doubleclick from displaying content while browsing. i’m talking about modifying the hosts file to deny such servers or something like that…

  2. Pantagruel November 16, 2007 at 12:43 am #

    Seems like they are getting more aggressive at pushing there rubbish down viewers throats.
    Like -normalsecrecy- mentions, this might be good market potential for the likes of MacAfee, Symantec and others. Furthermore any plugin or add-on for IE of FireFox blocking such crap would be welcome to the everage Jane and Joe. On the high end you could consider filtering content to root out these pop-ups and potential mallware getting through.

  3. Goodpeople November 16, 2007 at 11:51 am #

    One would expect that a reputable company like Doubleclick has a mechanism in place to prevent this sort of thing from happening. Quite frankly, I’m shocked.

    This goes much further than educating endusers alone. Every company that makes money on the net should be primarily focussed on the security aspect of their business.

    Of course Doubleclick never intended anything like this ever to happen. But it did, and aside from taking steps to prevent this from ever happening again (which I’m sure they’re working on as we speak), I think they should be held accountable. After all, they are the facilitating party.

    I guess the guys at Google might want to reconsider..

  4. Nobody_Holme November 16, 2007 at 5:58 pm #

    And this is why my adblock is set to ban doubleclick content, google ads, and anything like that i see. Basically if I see an ad, the soure URL is added to my banlist. I think that file is up to 2mb of plaintext now…

    And as much as i hate to defend ad companies, I dont think this is doubleclick’s fault… And they did stop it. Meh.

  5. Goodpeople November 18, 2007 at 8:44 pm #

    I’m not saying that Doubleclick are the bad guys, but apparently this has been going on for some time.

    I expect Doubleclick and other adspace resellers to _at_least_ check every sold banner on a daily basis. That would prevent the bad guys from buying bannerviews with a totally innocent banner and later replacing the banner with a malicious one.

    It seems that they have a system in place now. But that doesn’t clear them of the responsibility. They could have foreseen.. etc.

  6. Nobody_Holme November 19, 2007 at 7:50 pm #

    NONE of them seem to check on a daily basis… And the “report bad ad” links some sites use are always long-winded and annoying, so nobody uses them… Thing is, i’ve been seeing malicious ads on a daily basis for so many years (high-speed flashing likely to cause epileptic fits, and downloading trojians/spyware sounds like malicious) from both doubleclick and google ads at least that I just gloss over them. Admitedly, I do spend a bit much time on sections of the web you have to be PC literate to know about, so they cant catch many people, BUT, they’ve been there for years, so its kind of like overdraft charges, or other long-running problems that need a high-profile action to bring to make them bother.