Site icon LIFARS, a SecurityScorecard company

Dailymotion Targeted by Sophisticated Malvertising Campaign

Popular streaming website DailyMotion has been at the crosshairs of an intrusive malvertising campaign that spews malicious adverts.

Security researchers at security company Malwarebytes have uncovered a sophisticated malvertising campaign targeting various .eu based websites for several days until the payload was triggered when DailyMotion was hit.

In a blog post, senior security researcher Jérôme Segura said:

This particular malvertising attack is one of a few campaigns we have been tracking which is much more sophisticated than the average incidents we encounter daily.

We can say that lately threat actors have really stepped up their game in terms of being very stealthy and making a particular ad call look benign when reproduced in a lab environment.

Malvertising

A malvertising campaign routinely makes use of transactions based in online advertising and high-speed bidding. Also, such campaigns take advantage of the advertising process that brings an ad to a website that often involves several steps and organizations.

Here’s how the malvertising process works:

Segura added:

Indeed, the problem comes when we suspect foul play but can’t prove it with a live infection. It is difficult to convince ad networks to take action, when on the surface there’s nothing wrong with a particular advertiser.

The researchers at MalwareBytes commended the efforts of online media exchange platform Atomix, who were seen in the ad call. Highlighting their concerns, the incident was resolved when all the necessary parties involved were called upon, with prompt action taken to remove the malicious advertisement.

 

Exit mobile version