Home > Identity Theft > Is This Malware ‘South Park’-Inspired?

Comments 1 Comment

Malicious advertising, or malvertising, continues to pose a profound hazard, making visits to some of the Internet’s most popular websites a dicey proposition.

Cisco researchers have identified a criminal ring, christened the “Kyle and Stan” Malvertising Network (a likely reference to two of the main characters on “South Park”), that distributes sophisticated, mutating malware to Windows and even Mac computers.

Malicious ads that come and go are systematically appearing on amazon.com, ads.yahoo.com, www.winrar.com, youtube.com and 74 other domains, many of them high-traffic ones, listed here.

Since about 2007, cybergangs have been spreading infections designed to implant a back door giving them full control of your computing device. This happens imperceptibly when you click to an infected Web page. Lately, they’ve been embedding such infections in online ads, and paying for these malvertisements to appear in a sporadic pattern that’s difficult to defend.

This technique poses an insidious risk. The malicious code stealthily redirects victims to a website controlled by the attacker that’s poised to download malware onto the computing device.

“The attackers are purely relying on social engineering techniques, in order to get the user to install the software package,” reports Cisco researcher Armin Pelkmann. “The impressive thing is that we are seeing this technique not only work for Windows, but for Mac operating systems alike.”

Amazon Source

Amazon continues to be be a major source of malicious ads. This is not a surprise for IT security professionals. The U.S. was a top destination of malware in the world in the fourth quarter of 2013, according to a Washington Post news story.

The Post found that Amazon Web Services hosted four of the biggest malware-hosting sites, which represented 6% of all malware in the fourth quarter of 2013. Of the global hosting providers, Amazon had the biggest concentration of malware.

Although Amazon has tried to stop malware from being distributed through its hosting network, cybercriminals are still using Amazon’s cloud service not only to host malware but also to crack passwords.

The top search engines — Google and Microsoft Bing — haven’t been standing pat. Their Web crawlers, which continually index billions of Web pages, are tuned to blacklist any Web page carrying malicious content. This has substantially reduced the number of tainted pages that turn up in the answers to search queries.

What’s more, all the major antivirus vendors, from Symantec and McAfee on down, maintain Web crawlers specifically seeking out infected pages and adding them to blacklists fed into their virus-scanning services.

Playing Possum

Of course, the bad guys have swiftly jumped ahead. The latest Web infections are designed to play possum when a search engine or antivirus Web crawler comes calling. Bad guys do this by employing a blacklist of their own, one that contains the known IP addresses of the good-guy crawlers.

They also continue to look for smaller websites where it’s still possible for them to easily seed an infection directly onto a poorly defended Web page.

Borrowing targeting technology from the advertising industry, the bad guys are also customizing when — and to whom — they deliver malicious ads.

“Protecting ad network infrastructure is a hard problem to solve,” says Matt Huang vice president of product management at messaging security vendor Proofpoint. “The ad ecosystem is so big with such sophistication that it’s hard to pin point which party in the ad serving chain is ultimately responsible for the malicious ad.”

It’s often the case that the website that displays the ad and the end user who sees the ad have “no control over what ads will be displayed.” Huang says. “This becomes a perfect playground for attackers. The technology is readily available, the cost is cheap, and the impact is not only great, but can be precisely targeted.”

No doubt the gang behind the “Kyle and Stan” malvertising network agree.

What can you, as an individual do? Keep your antivirus software updated, and for that matter, keep all updates related to your browser, operating systems and key applications current. Updating your software is necessary because the bad guys are continually ferreting out security holes, which the good guys then patch. This cycle shows no signs of ending any time soon.

Also, use the scanning system that comes with your antivirus suite. It will stop the lion’s share of the known websites being used to send malware to victims’ computing devices.

More on Identity Theft:

Image: iStock

Comments on articles and responses to those comments are not provided or commissioned by a bank advertiser. Responses have not been reviewed, approved or otherwise endorsed by a bank advertiser. It is not a bank advertiser's responsibility to ensure all posts and/or questions are answered.

Please note that our comments are moderated, so it may take a little time before you see them on the page. Thanks for your patience.

  • John Walker

    The link to the orginal Cisco article is great. There is a flow chart of how this malware is installed. May finally convince some people using Macs that they are susceptible too.

Certain credit cards and other financial products mentioned in this and other articles on Credit.com News & Advice may also be offered through Credit.com product pages, and Credit.com will be compensated if our users apply for and ultimately sign up for any of these cards or products. However, this relationship does not result in any preferential editorial treatment.

Hello, Reader!

Thanks for checking out Credit.com. We hope you find the site and the journalism we produce useful. We wanted to take some time to tell you a bit about ourselves.

Our People

The Credit.com editorial team is staffed by a team of editors and reporters, each with many years of financial reporting experience. We’ve worked for places like the New York Times, American Banker, Frontline, TheStreet.com, Business Insider, ABC News, NBC News, CNBC and many others. We also employ a few freelancers and more than 50 contributors (these are typically subject matter experts from the worlds of finance, academia, politics, business and elsewhere).

Our Reporting

We take great pains to ensure that the articles, video and graphics you see on Credit.com are thoroughly reported and fact-checked. Each story is read by two separate editors, and we adhere to the highest editorial standards. We’re not perfect, however, and if you see something that you think is wrong, please email us at editorial team [at] credit [dot] com,

The Credit.com editorial team is committed to providing our readers and viewers with sound, well-reported and understandable information designed to inform and empower. We won’t tell you what to do. We will, however, do our best to explain the consequences of various actions, thereby arming you with the information you need to make decisions that are in your best interests. We also write about things relating to money and finance we think are interesting and want to share.

In addition to appearing on Credit.com, our articles are syndicated to dozens of other news sites. We have more than 100 partners, including MSN, ABC News, CBS News, Yahoo, Marketwatch, Scripps, Money Magazine and many others. This network operates similarly to the Associated Press or Reuters, except we focus almost exclusively on issues relating to personal finance. These are not advertorial or paid placements, rather we provide these articles to our partners in most cases for free. These relationships create more awareness of Credit.com in general and they result in more traffic to us as well.

Our Business Model

Credit.com’s journalism is largely supported by an e-commerce business model. Rather than rely on revenue from display ad impressions, Credit.com maintains a financial marketplace separate from its editorial pages. When someone navigates to those pages, and applies for a credit card, for example, Credit.com will get paid what is essentially a finder’s fee if that person ends up getting the card. That doesn’t mean, however, that our editorial decisions are informed by the products available in our marketplace. The editorial team chooses what to write about and how to write about it independently of the decisions and priorities of the business side of the company. In fact, we maintain a strict and important firewall between the editorial and business departments. Our mission as journalists is to serve the reader, not the advertiser. In that sense, we are no different from any other news organization that is supported by ad revenue.

Visitors to Credit.com are also able to register for a free Credit.com account, which gives them access to a tool called The Credit Report Card. This tool provides users with two free credit scores and a breakdown of the information in their Experian credit report, updated twice monthly. Again, this tool is entirely free, and we mention that frequently in our articles, because we think that it’s a good thing for users to have access to data like this. Separate from its educational value, there is also a business angle to the Credit Report Card. Registered users can be matched with products and services for which they are most likely to qualify. In other words, if you register and you find that your credit is less than stellar, Credit.com won’t recommend a high-end platinum credit card that requires an excellent credit score You’d likely get rejected, and that’s no good for you or Credit.com. You’d be no closer to getting a product you need, there’d be a wasted inquiry on your credit report, and Credit.com wouldn’t get paid. These are essentially what are commonly referred to as "targeted ads" in the world of the Internet. Despite all of this, however, even if you never apply for any product, the Credit Report Card will remain free, and none of this will impact how the editorial team reports on credit and credit scores.

Our Owners

Credit.com is owned by Progrexion Holdings Inc. which is the owner and administrator of a number of business related to credit and credit repair, including CreditRepair.com, and eFolks. In addition, Progrexion also provides services to Lexington Law Firm as a third party provider. Despite being owned by Progrexion, it is not the role of the Credit.com editorial team to advocate the use of the company’s other services. In articles, reporters may mention credit repair as an option, for example, but we’ll also be sure to note the various alternatives to that service. Furthermore, you may see ads for credit repair services on Credit.com, but the editorial team isn’t responsible for the creation or implementation of those ads, anymore than reporters for the New York Times or Washington Post are responsible for the ads on their sites.

Your Stories

Lastly, much of what we do is informed by our own experiences as well as the experiences of our readers. We want to tell your stories if you’re interested in sharing them. Please email us at story ideas [at] credit [dot] com with ideas or visit us on Facebook or Twitter.

Thanks for stopping by.

- The Credit.com Editorial Team