Google, Microsoft Duped Into Serving Malware Ads

Google, Microsoft Duped Into Serving Malware AdsGoogle's advertising subsidiary DoubleClick and Microsoft’s MSN ads service both have admitted to falling for a clever scheme by some nasty black hat hackers. Malicious banner ads for both services were found to be trying to perform drive-by download exploitation and install malware on users' machines.

As with many great (or terrible) episodes of computer crime, a key component was clever social engineering. Hackers created a site called -- one letter away from, a major online advertising technology firm. Apparently that was enough to get the ads through screeners at Microsoft and Google.

Security firm Armorize appears to be the first to have noticed the attack. Wayne Huang chief technology officer of Armorize details the unusual incident in a blog, writing:

Users visit websites that incorporate banner ads from DoubleClick or, the malicious javascript is served from (notice the three f's), starts a drive-by download process and if successful, HDD Plus and other malware are installed into the victim's machine, without having the need to trick the victim into doing anything or clicking on anything. Simply visiting the page infects the visitors.

Known sites affected: Sites that incorporate DoubleClick or banners, including for example (using DoubleClick),, (using both), and We'd like to note here it's very possible that multiple exchanges, besides those listed here, have been serving the fake ADShufffle's ads.

For all its ingenuity, the attackers used pretty standard exploitation packages, including Neosploit and the Eleonore exploit kit. Both kits are popular among black hat hackers, but also among security experts who purchase them to battle-test the security of corporate systems.

The latest attack used Javascript exploits to begin a download procedure, which was triggered when users visited a page that was serving the compromised banner ads. The ad service would then request the code for the ad from the hackers' servers, initiating the attack.

A Google spokesperson assured that the ads were only up for a very brief time and have since been terminated. The company is now investigating the incident. Microsoft did not release a statement, but likely is taking similar measures.

The incident is not Google's first brush with malware advertising. Previously malicious hackers were found to be leveraging Google's AdWords service. In that case, as well, the key to the criminals' success was using legitimate-looking links.

Source: DailyTech

Tags: Google, Microsoft

Add comment

Your name:
Sign in with:
Your comment:

Enter code:

E-mail (not required)
E-mail will not be disclosed to the third party

Last news

Pokemon GO had the potential to net $1 billion a year
The report said that Hon Hai has invested about US$600 million in India
Market research firm IDC reports that in the third quarter of this year
Customers will only have to shell out 50% of the cost of their Galaxy S7 device
New flagship will launch in 2017
Patent hints at name of the upcoming Surface AIO
IBM, Globalfoundries and Samsung have chosen to use extreme ultraviolet (EUV) light to pattern transistors
Samsung Galaxy TabPro S - a tablet with the Windows-keyboard
The first Windows-tablet with the 12-inch display Super AMOLED
June 7, 2016 /
Keyboards for iOS
Ten iOS keyboards review
July 18, 2015 /
Samsung E1200 Mobile Phone Review
A cheap phone with a good screen
March 8, 2015 / 4
Creative Sound Blaster Z sound card review
Good sound for those who are not satisfied with the onboard solution
September 25, 2014 / 2
Samsung Galaxy Gear: Smartwatch at High Price
The first smartwatch from Samsung - almost a smartphone with a small body
December 19, 2013 /
HP Slate 7 is a 7-inch Android 4 Tablet PC with good sound
A cost-effective, 7-inch tablet PC from a renowned manufacturer
October 25, 2013 / 4

News Archive



Do you use microSD card with your phone?
or leave your own version in comments