Malware

AdGholas malvertising campaign hid malicious code in images to avoid discovery

In what researchers are calling a first, a massive malvertising campaign that infected thousands of people per day was relying on steganography – the art of hiding code in images – to conceal malware that was delivered to the victims in drive-by fashion. 

Discovered in 2015 by Proofpoint, the campaign – dubbed AdGholas – was recruiting as many as one million client machines on a daily basis to conduct its operations until ceasing operations this month after the cybersecurity firm alerted affected advertising network operators.

Not all users who clicked on an AdGholas-delivered malicious ads were redirected to a malicious webpage and infected, according to a Proofpoint blog post. Indeed, AdGholas was cleverly designed to be highly discriminating, weeding out any machines on which it might be discovered, especially by a researcher, explained Patrick Wheeler, director of threat intelligence at ProofPoint, in an interview with SCMagazine.com.

To go after the average, less tech-savvy user, the perpetrators behind AdGholas used highly sophisticated filtering technologies to either eliminate or select prospective victims based on language settings, time zones, and browser configuration. The filtering mechanisms also sought out machines that contained specific software or drivers typically associated with certain computer brands that the attackers wanted to specifically target.

Those who fit the profile received a cookie programmed to redirect them to fraudulent websites containing JavaScript-based ad banners with malicious code hidden within the images to avoid forensic detection. Trend Micro assisted Proofpoint in the dissection of the steganography technique.

Of the 1-5 million hits AdGholas generated on a daily basis, 10-20 percent were redirected to these fake webpages, which closely impersonated legitimate sites, including one belonging to a French hotel. These pages delivered exploit kits – first Angler, then Neutrino – that automatically infected users with malware.

Specifically, Proofpoint observed exploit kits dropping location-specific banking Trojans, including Gozi ISFB in Canada, Godzilla-loaded Terdot.A in Australia and Gootkit in Spain.

Wheeler said that the online advertisement networks that delivered the malicious advertisements “did nothing wrong,” and were merely taken advantage of by a highly sophisticated actor.

Christopher Budd, global threat communications manager at Trend Micro, told SCMagazine.com that partnerships like the one formed with Proofpoint on this investigation “are a key thing in this industry…Working together is critical. This latest [partnership] is a great example of that.”

Bradley Barth

As director of multimedia content strategy at CyberRisk Alliance, Bradley Barth develops content for online conferences, webcasts, podcasts video/multimedia projects — often serving as moderator or host. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.