Malvertising Gets Boost From Malicious Browser Plug-ins

Cisco discovers malicious browser add-ons that serve up unwanted and sometimes infected ads.

Dark Reading Staff, Dark Reading

February 13, 2015

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Cisco's Talos Group has discovered malicious browser plug-ins that inject unwanted or infected ads onto certain pages an unfortunate user visits.

The attackers can thus deliver malware (via infected ads), collect user behavior data, or just get a nibble of the $200 billion online advertising market.

The browser add-ons also fingerprint the user's system, and display ads customized for different operating systems -- a PC repair ad for Windows and a gaming ad for Linux, for example. Plus, the installer circumvents Google Chrome's policy of distrusting third-party plug-ins, by manually whitelisting them.

For more details, see the Cisco threat report blog.

 

Read more about:

2015

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights