Cybercriminals attack Google Adsense to pump out malicious redirects

Google Adsense has fallen prey to a spate of malicious ads in the last month, and cybercriminals are to blame.

Published
Updated
1 minute & 21 seconds read time

Over the past month a number of websites, including TweakTown, have experienced sporadic redirects to scam websites. It has been exceptionally difficult to track down the source of these redirects, and our team has been working tirelessly to isolate the source of the issue. The source of the issue appears to be malicious code injected into Google Adsense ads, which are used by websites around the world.

Cybercriminals attack Google Adsense to pump out malicious redirects 02

In December a number of webmasters took to Google's Adsense Forum to complain of the issue, which seems to have peaked around January 9th. A total of 180 complaints were made on that day alone. Web security company Sucuri explains that cybercriminals possibly exploited two Adsense campaigns with Javascript code that loaded the malicious code. This redirect unfolds whether the user clicks the ad or not. Sucuri was able to track down the source, and notes:

The malicious redirect worked even in the Ad Review Center of the Google AdSense dashboard on Google.com site where webmasters may view ads that Google displays on their sites. This problem existed for about a month since the second half of December 2014, but became really widespread last Friday (Jan 9th 2015). By the end of the weekend, Google seemed to have been able to mitigate it.

While there may be notably reduced frequency to the malicious ads, they are still circulating. We have noticed these redirects are still present on other websites as well during the last few days. Google Adsense works by targeting specific ads to a specific viewers. This type of maddening attack, referred to as Malvertising, is hard to track because different users view different ads. The redirects are landing users on pages that appear legitimate, such as a fake Forbes website, but are all contained in different subdirectoriess of lemode-mgz.com, consumernews247.com, and wan-tracker.com.

Frankly, its surprising that Google was able to be exploited on such a large scale. Perhaps the policy of allowing code in their ads that can be easily modified for nefarious purposes should be reviewed.

NEWS SOURCES:myce.com, blog.sucuri.net

The quest for benchmark world records led Paul further and further down the overclocking rabbit hole. SSDs and RAID controllers were a big part of that equation, allowing him to push performance to the bleeding edge. Finding the fastest and most extreme storage solutions led to experience with a myriad of high-end enterprise devices. Soon testing SSDs and Enterprise RAID controllers at the limits of their performance became Paul's real passion, one that is carried out through writing articles and reviews.

Newsletter Subscription

Related Tags