Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Malvertising: When Advertisements on Legitimate Sites Contain Malware

b2ap3_thumbnail_malvertised_content_400.jpgAny business worth their gigabytes will practice extreme caution when surfing the Internet. Hackers tend to make users’ lives more difficult, even for those who are part of a small or medium-sized business. Teaching your employees security best practices in hopes that they’ll avoid suspicious websites isn’t a foolproof strategy, and thanks to malvertising, ensuring that your organization stays secure is more difficult.

The reasoning is that it’s becoming more difficult to identify potential threats because they can take the form of non-suspicious entities in the online environment. In particular, a new and emerging threat called “malvertising” threatens even the most cautious PC users by injecting malicious code via advertisements. This type of malware often takes advantage of zero-day exploits (mainly with flash) that haven’t been patched by the manufacturer. These kinds of threats are challenging to avoid, even under the best circumstances. For example, check out this malvertising threat described by ComputerWorld:

[...] the source of the infection was a malicious advertisement, one that was running on a mainstream news service! The news website sells ad space served up by an advertising company, which in turn sells that ad space to anybody willing to pay for it. In this case, the bad guys were paying for it. They signed up for ad space just like any other customer, but the advertisement they created — known as “malvertising” — exploited a zero-day (unpatched) vulnerability in Adobe Flash to run commands through the browser to the victim computers’ operating systems, without any knowledge or intervention by the end users.

Taking advantage of the latest cybersecurity measures, like enterprise-level firewall and antivirus solutions, can be great tools to ensure that your organization's network stays secure, but what happens if threats are capable of bypassing these measures? In the above scenario, the malware-fueled advertisement ignored all standard online threat behavior that’s expected of users. The malware needed no user activity, and because it was found on a legitimate site’s ad space, it wasn’t flagged as malicious. In other words, the malware was capable of ignoring the methods used by typical security solutions and employee training, and it managed to infiltrate the system.

Even if malware somehow finds ways to ignore security protocol, there are still ways to identify and resolve problems in a moment’s notice. If you remember anything about cyberthreats, keep this in mind: they will almost always leave some sort of sign that they’re present on your network or workstation. It could be something as simple as decreased network or PC performance, or it could be something a little more obvious. You’ll know if you’re being attacked when your firewall detects viruses or malware attempting to access the network, and phishing emails are blocked by spam filters. Even something as simple as a remote administrator login on your access log can be a giveaway that you’re dealing with a hacker.

Even if malvertising is a new and growing trend, you want to make sure that your network is protected from all threats that can be found on the Internet. Using an enterprise-level security solution like a Unified Threat Management (UTM) tool is capable of limiting your business’s exposure to questionable online entities and maximize threat resistance. To learn more, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 May 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Office Backup Apps Business Continuity The Internet of Things Social Media Disaster Recovery Communication Bandwidth Hacking WiFi Facebook Operating System Microsoft Office Android Firewall Apple Content Filtering Cybercrime Best Practice Website Alert Smartphones Networking Data storage Data Windows Employer-Employee Relationship Experience History Two-factor Authentication Small Business Phishing App Money Mobile Device Management Mobile Computing Network Big Data communications Safety Managed Service Provider Unified Threat Management Outlook Quick Tips Wireless Technology Social Remote Computing Shortcut DDoS Browser Printer Virtual Desktop End of Support Heating/Cooling Wireless Word Unified Communications Securty Encryption Document Management Law Enforcement SaaS Writing VoIP Business Management Competition Cortana Proactive IT Network Congestion Presentation Entrepreneur Save Money Domains Music Retail Hacker Cryptocurrency Laptop Application IBM Google Docs Education Managed IT services Customer Service Holiday Cleaning Black Market YouTube Processors Office Tips LiFi Bluetooth Staffing Router Downtime BYOD Office 365 Passwords Streaming Media Automation Help Desk Saving Money Micrsooft Visible Light Communication Memory Analytics Disaster intranet Lithium-ion battery Business Growth Data Management Deep Learning Robot Advertising BDR Recovery Sports Social Networking Society Google Wallet Spam Vendor Management Public Speaking Information Technology IP Address Running Cable Virtualization Internet of Things Windows 8 Hosted Solution Windows XP Monitors IT Services Government Artificial Intelligence Augmented Reality Documents Keyboard Compliance User Tech Support Search Drones Displays Hard Drives
QR-Code