Bad Ads Spotlight: Ad Cloaking Abuses. May TrustInAds.org. Keeping people safe from bad online ads
|
|
|
- Laurence Scott
- 10 years ago
- Views:
Transcription
1 Bad Ads Spotlight: Ad Cloaking Abuses May 2015 TrustInAds.org Keeping people safe from bad online ads
2 OVERVIEW Online advertising platforms use a number of technologies to ensure the right content is shown to the right user. In order to do this correctly, platforms analyze small bits of data regarding the device or device location and change landing page content based upon this information. By modifying the content or presentation of a page based upon specific factors, the advertising platform is able to provide a better experience to the user. This ensures, for example, that a user visiting the page in France receives the webpage in French whereas a user in Japan receives the same page in Japanese. This concept also holds true for a user s device by enabling an advertiser to show either a mobile or desktop version of the landing page based upon the device being used by the user. Unfortunately, similar types of technology are used by bad actors in order to deceive advertising platforms. This deception, known as ad cloaking, exposes users not only to content that is a violation of the platform s advertising policies, but also to content that is low quality, inaccurate, or misleading in nature. Ad cloaking is an obfuscation method used by advertisers to alter the content of a landing page based upon a predetermined factor. The primary intent of ad cloaking is to show different content to the advertising platform than what is shown to the user in order to push traffic to non-compliant web pages. The advertiser will show a compliant page to the advertising platform during a quality review; however, through the use of scripts that purposely redirect the user, when he or she clicks on the same ad, they are taken to a non-compliant page. While the overwhelmingly majority of ads that are seen by users on advertising platforms are safe and are within TrustInAds.org member companies advertising policies, ad cloaking is a growing issue, and we feel it is important to raise awareness around challenges we face everyday in fighting against bad actors to protect users and ensure a positive user experience. EXAMPLES Below are examples of ad schemes that utilized cloaking to direct the user to a different page. In Figs. 1 and 2, the web page on the left was displayed to the advertising platform during the ad review process. The landing page is the site of the company that the advertiser purported to represent. The web page on the right is the page delivered to a user clicking on the ad. The webpage mimics a legitimate company site in an attempt to sell a skin care product. TrustInAds.org 1
3 (Figs. 1, 2) Figs. 3, 4 and 5 are screenshots of non-compliant websites to which users were directed through ads that were originally approved by the advertising platform. (Figs. 3, 4, 5)! TrustInAds.org 2
4 The trick with ad cloaking is knowing who and what to exclude. In order to effectively cloak the ad, the advertiser has to identify the advertising platform and serve the platform different content than that which is presented to the target users. Platforms can be identified based upon an IP address, geo-location, and other identifying factors. This information can be gathered through a series of redirects that occur after clicking on an ad. Once that is done, a good ad can be shown to the platform and a bad ad served to the user. As shown in the below screenshot (Fig. 6) taken from an underground hacking forum, cloakers have developed tools and support networks to enable this activity. (Fig. 6) Research into underground forums reveals a small number of individuals providing cloaking services and sell code scripts that provide the redirection and customer support. Of the three scripts sellers observed, two of them allowed their customers to set the redirection through a User Interface (UI). These UI s allow an advertiser to easily select how the advertiser wants to cloak and where they want the user to be directed. Due to the deceptive nature of cloaking and the diversity of factors on which ad cloaking can be executed, advertising platforms use varied and ever changing methods to combat this kind of challenge. Techniques can include using a brute force method to combating ad cloaking. In this method, companies obtain a diversified number of IP addresses from which to crawl the clicked URLs - in effect masking their own IPs from the bad actors they are working against. Platforms also use other technical methods, manual reviews, and other means to fight this behavior. Advertising platforms aim to protect users from these cloaked ads and landing pages, spending considerable time and effort to give users the absolute best possible user experience on their sites. When a user clicks on an ad for a product or service, the user anticipates that he or she will be redirected to a webpage providing more information regarding that specific product or service. When users encounter cloaked landing pages, their trust in ads can be eroded due to the actions of these bad advertisers.! TrustInAds.org 3
5 USER VIGILENCE AND REPORTING POTENTIAL ABUSES One of the best ways our member companies can fight against ad cloaking is through user feedback. By reporting suspicious activity, our companies can quickly investigate the issue and take appropriate action. And as with all of our previous Trend Alerts and Spotlight Reports, we strongly encourage users to report any advertisement they find suspicious by visiting TrustInAds.org 4
6 ABOUT TRUSTINADS.ORG TrustInAds.org comprises a group of Internet industry leaders that have come together to work toward a common goal: Protect people from malicious online advertisements and deceptive practices. With this effort, TrustInAds.org and its member companies are: Bringing awareness to consumers about online ad-related scams and deceptive activities; collaborating to identify trends in deceptive ads and sharing best practices; and sharing our knowledge with policy makers and consumer advocates around the country. To learn more, visit Follow us on Twitter, Facebook and Google+.! TrustInAds.org 5
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
AWEBDESK LIVE CHAT SOFTWARE
AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.2 January 2014 Page 1 TABLE OF CONTENTS Introduction.......... 4 Sign In as Admin...5 Admin Dashboard Overview.
WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2
FAQ WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2 WHAT IS UPTIME AND SPEED MONITORING 2 WHEN I TRY TO SELECT A SERVICE FROM
AWEBDESK LIVE CHAT SOFTWARE
AWEBDESK LIVE CHAT SOFTWARE Version 6.1.0 AwebDesk Softwares Administrator Guide Edition 1.0 November 2012 Page 1 TABLE OF CONTENTS Introduction.......... 3 Sign In as Admin...4 Admin Dashboard Overview.
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
SEO: How to Use Everyday Techniques to Increase Website Traffic. Robin Kelly @RobinKelly The University of Texas at Tyler
SEO: How to Use Everyday Techniques to Increase Website Traffic Robin Kelly @RobinKelly The University of Texas at Tyler SEO: How to Use Everyday Techniques to Increase Website Traffic STRUCTURE Built
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
Add Munchkin Tracking Code to Your Website
Add Munchkin Tracking Code to Your Website Please ensure that you have access to an experienced JavaScript developer. Marketo Technical Support is not set up to assist with troubleshooting custom JavaScript.
Using Google Analytics
Using Google Analytics Overview Google Analytics is a free tracking application used to monitor visitors to your website in order to provide site designers with a fuller knowledge of their audience. At
A TASTE OF HTTP BOTNETS
Botnets come in many flavors. As one might expect, these flavors all taste different. A lot of Internet users have had their taste of IRC, P2P and HTTP based botnets as their computers were infected with
Using ShopTab with an Affiliate Marketing Program
Using ShopTab with an Affiliate Marketing Program An affiliate marketing program can be a very effective way to drive revenues for a merchants and marketing networks by creating a large group of sellers
Cyber Security. Maintaining Your Identity on the Net
Cyber Security Maintaining Your Identity on the Net Why Cyber Security? There are three points of failure in any secure network: Technology (hardware and software) Technology Support (ITS) End Users (USD
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
OIG Fraud Alert Phishing
U.S. EQUAL EMPLOYMENT OPPORTUNITY COMMISSION Washington, D.C. 20507 Office of Inspector General Aletha L. Brown Inspector General July 22, 2005 OIG Fraud Alert Phishing What is Phishing? Phishing is a
Search Engine Optimization (SEO)
Search Engine Optimization (SEO) Saurabh Chavan, Apoorva Chitre, Husain Bhala Abstract Search engine optimization is often about making small modifications to parts of your website. When viewed individually,
1. The information we collect and how we collect it.
PRIVACY POLICY AND YOUR PRIVACY RIGHTS CountySportsZone.com aggregates, reports, and publishes high school sports information for jurisdictions across the state of Maryland. In this Privacy Policy, Affiliates
Contents. Homepage: PTC Profit Boost. Webhosting: Hostclipse webhosting
1 Contents 1. INTRODUCTION... 3 2. HOW TO GET DIRECT REFERRALS ON PTC SITES?... 4 2.1. HOW TO CHOOSE WHICH PTC SITE TO PROMOTE?... 4 2.2. HOW TO FIND NEW PTC SITES?... 6 2.3. OPENING A WEBSITE/BLOG TO
Cybercrime Prevention and Awareness
April, 2014 Cybercrime Prevention and Awareness Basic Security Principles to Help You Better Navigate Through Cyberspace To join conference call dial (305) 433-6663 option 4 PIN # 42014 Presented by: Miguel
Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction
Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we
Campaign and Ad Group Management. Google AdWords Fundamentals
Campaign and Ad Group Management Google AdWords Fundamentals Question: When a Campaign is Pending what does this mean? Question: When a Campaign is Pending what does this mean? ANSWER: IT MEANS THE CAMPAIGN
Deception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL [email protected] Deception scams drive increase in financial fraud
BRIEFING PAPER - Rogue Affiliates Distributing CSAM using Disguised Websites (Public version)
BRIEFING PAPER - Rogue Affiliates Distributing CSAM using Disguised Websites (Public version) Created April 2014 Author Created for Sarah Smith (Technical Researcher, IWF) Fred Langford (Director of Global
Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology
Attracting Buyers with Search, Semantic, and Recommendation Technology Learning Objectives Using Search Technology for Business Success Organic Search and Search Engine Optimization Recommendation Engines
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
Enterprise-Grade Security from the Cloud
Datasheet Website Security Enterprise-Grade Security from the Cloud Unmatched web application security experience, enhanced by real-time big data analytics, enables Incapsula to provide best-of-breed security
Search Engine Optimization (SEO) with Google
Search Engine Optimization (SEO) with Google Asst. Prof. Dr. Thotsapon Sortrakul Mr.Chinapat Eksathit Thailand Abstract- at present, internet is one of the major needs for everyone. Someone needs it for
Proxy Blocking: Preventing Tunnels Around Your Web Filter. Information Paper August 2009
Proxy Blocking: Preventing Tunnels Around Your Web Filter Information Paper August 2009 Table of Contents Introduction... 3 What Are Proxies?... 3 Web Proxies... 3 CGI Proxies... 4 The Lightspeed Proxy
EXPOSING CLICK FRAUD
Using Web Analytics To Identify Possible Click Fraud A White Paper From Net Applications NETAPPLICATIONS.COM What Is Click Fraud? page 2/7 Click Fraud Vs. Paid Placement "In your experience, how much of
The mobile opportunity: How to capture upwards of 200% in lost traffic
June 2014 BrightEdge Mobile Share Report The mobile opportunity: How to capture upwards of 200% in lost traffic You ve likely heard that mobile website optimization is the next frontier, and you ve probably
Comprehensibility: Look and Feel: Time to install and configure: 130 minutes NAME PROFIL PARENTAL FILTER 2. Profil Technology. Company. Version 2.4.
NAME PROFIL PARENTAL FILTER 2 Company Profil Technology Version 2.4.0 Type of product Devices supported Operating systems Client Computer Windows 7 (32/64 bit) Windows XP (32/64 bit) Windows Vista (32/64
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz
Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz Ok, so this isn t the typical way that a pen test report would start, but we might as well get straight in to it. I am a customer of Sainsbury
Security Analysis on Craigslist (December 2009)
1 Security Analysis on Craigslist (December 2009) Bryan Lengle, Mathew Sam, Jiyan Lam, Adrian Lee, University of British Columbia Abstract Craigslist is a popular website that provides local classifieds
How To Hack An Apple Iphone With A Phishing Kit
Analysis Report Besmellah Apple phishing kit Introducing the campaign In the recent past, Apple customers have been amongst the favourite targets of cyber attacks, especially in the form of phishing. Cybercriminals
Worst Practices in. Search Engine Optimization. contributed articles
BY ROSS A. MALAGA DOI: 10.1145/1409360.1409388 Worst Practices in Search Engine Optimization MANY ONLINE COMPANIES HAVE BECOME AWARE of the importance of ranking well in the search engines. A recent article
A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged.
A new fake Citibank phishing scam using advanced techniques to manipulate users into surrendering online banking access has emerged. The Citibank scam tricks users into surrendering their online banking
8 illegitimate reasons for discrepancies between AdWords and Google Analytics conversions
8 illegitimate reasons for discrepancies between AdWords and Google Analytics conversions If you are an experienced AdWords advertiser, you probably have familiarity with AdWords conversion tracking code.
MNI Networks Limited Acceptable Use Policy
This Acceptable Use Policy ("AUP") sets out the actions prohibited to users of the MNINET Network ( MNINET ). Users are defined as anyone who uses or accesses the.ms domain registry, who has responsibility
DNS Server Operation & Configuration
Introduction The internet has a tree like network of DNS servers, which are responsible for converting a URL (e.g. www.google.com) to an IP address. The root DNS server shares it's database with all of
TRAFFIC FRAUD. i n V i d e o A d v e r t i s i n g
TRAFFIC FRAUD i n V i d e o A d v e r t i s i n g Why Should You Read This Report? Every year, traffic fraud visits to a publisher s site without the knowledge of a legitimate user, or driven by non-human
Phishing by data URI
Phishing by data URI Henning Klevjer [email protected] October 22, 2012 1 Abstract Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker.
WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001
WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their
BULK MAIL CAMPAIGN RULES
BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%
STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect
STOPPING LAYER 7 ATTACKS with F5 ASM Sven Müller Security Solution Architect Agenda Who is targeted How do Layer 7 attacks look like How to protect against Layer 7 attacks Building a security policy Layer
White Paper: Social Media - The Dark Side
November 2010 White Paper: Social Media - The Dark Side by Elias Vamvakas President, BrandProtect a division of brandprotect Understanding the Value of a Social Media Risk Management Program As Social
[Ramit Solutions] www.ramitsolutions.com SEO SMO- SEM - PPC. [Internet / Online Marketing Concepts] SEO Training Concepts SEO TEAM Ramit Solutions
[Ramit Solutions] www.ramitsolutions.com SEO SMO- SEM - PPC [Internet / Online Marketing Concepts] SEO Training Concepts SEO TEAM Ramit Solutions [2014-2016] By Lathish Difference between Offline Marketing
PARTNER EMAIL GUIDELINES
PARTNER EMAIL GUIDELINES The guidelines listed below are required pursuant to the Agreement entered into between Criteo and the Partner. Any breach of these guidelines except the last section related to
Dissecting the Recent Cyber Security Breaches. Yu Cai School of Technology Michigan Technological University
Dissecting the Recent Cyber Security Breaches Yu Cai School of Technology Michigan Technological University Disclaimers Most information in this presentation was collected from various sources on the Internet.
The Underground Economy of the Pay-Per-Install (PPI) Business
The Underground Economy of the Pay-Per-Install (PPI) Business Kevin Stevens, Security Researcher SecureWorks Counter Threat Unit (CTU) History of the PPI Business The Pay-Per-Install business model (PPI)
Measure. Analyze. Optimize. Search Engine Optimization. Prepared for: Onstar Pest Control. http://www.onstarpestcontrol.com. Date: March 30th, 2015
YESOnline LLC. 1.844.704.YESO toll free [email protected] Measure. Analyze. Optimize. Search Engine Optimization Prepared for: Onstar Pest Control http://www.onstarpestcontrol.com Date: March 30th, 2015
Vyve Broadband Website Privacy Policy. What Information About Me Is Collected and Stored?
Vyve Broadband Website Privacy Policy Effective: July 31, 2015 Vyve Broadband ( Vyve, we, us, our ) is committed to letting you know how we will collect and use your information. This Website Privacy Policy
Exploring the Black Hole Exploit Kit
Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary
SEO Definition. SEM Definition
SEO Definition Search engine optimization (SEO) is the process of improving the volume and quality of traffic to a web site from search engines via "natural" ("organic" or "algorithmic") search results.
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
reviveads AD BLOCK PREVENTION
Our team at ReviveAds has been tracking and delivering ads to ad block users for the last two years. This data unless specified from another source is from a sample size of 1 billion ads that we have taken
Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS
Trend Micro Incorporated Research Paper 2012 Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS By: Jon Oliver, Sandra Cheng, Lala Manly, Joey Zhu, Roland
Internet Marketing Implementation Course MKTG13; 3 Days, Instructor-led
Internet Marketing Implementation Course MKTG13; 3 Days, Instructor-led Course Description A comprehensive internet marketing training course that covers Social Media, SEO, Email Marketing, PPC, Conversion
ACCEPTABLE USE AND TAKEDOWN POLICY
ACCEPTABLE USE AND TAKEDOWN POLICY This Acceptable Use and Takedown Policy ( Acceptable Use Policy ) of Wedding TLD2, LLC (the Registry ), is to be read together with the Registration Agreement and words
The Devil is Phishing: Rethinking Web Single Sign On Systems Security. Chuan Yue USENIX Workshop on Large Scale Exploits
The Devil is Phishing: Rethinking Web Single Sign On Systems Security Chuan Yue USENIX Workshop on Large Scale Exploits and Emergent Threats (LEET 2013) Web Single Sign On (SSO) systems Sign in multiple
Tracking True & False Demystifying Recruitment Marketing Analytics
Tracking True & False Demystifying Recruitment Marketing Analytics THE CANDIDATE JOURNEY SIMPLIFIED THE DECISION CYCLE SIMPLIFIED Awareness & Attraction Research & Decision Conversion Action THE CANDIDATE
Don DeBolt and Kiran Bandla 29 September 2010
BlackHat SEO: Abusing Google Trends to Serve Malware Don DeBolt and Kiran Bandla 29 September 2010 Agenda BlackHat SEO Logic and Components Background Research Methodology Findings Conclusion Logic flow
How To Track Your Mobile Marketing On A Mobile Device
emma Mobile Business Intelligence The big problem in ecommerce is the recurrency Best customers comes from Mobile emma is Mobile Business Intelligence. The ultimate mobile marketing technology in the market
The objective setting phase will then help you define other aspects of the project including:
Web design At the start of a new or redesign web project, an important first step is to define the objectives for the web site. What actions do you want visitors to take when they land on the web site?
Know Your Foe. Threat Infrastructure Analysis Pitfalls
Know Your Foe Threat Infrastructure Analysis Pitfalls Who Are We? Founders of PassiveTotal Analysts/researchers with 10+ years of collective experience Interested in Better UX/UI for security systems Improving/re-thinking
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
GOOGLE ANALYTICS TERMS
GOOGLE ANALYTICS TERMS BOUNCE RATE The average percentage of people who visited your website and only viewed one page. In Google Analytics, you are able to see a site-wide bounce rate and bounce rates
