
Malware, that malicious software that infects our computers may have just found a new distribution mechanism which is being called Malvertising. Traditionally spread through so called Phishing techniques, like emails that promise to make you rich or links to free software, malware is just a fact of life these days.
Distribution via Web Ads
While most people are wary of not clicking on links in emails from spam or people we don’t know, malware producers have discovered new ways to get their software onto your computer. Now they are infecting advertising networks in what is now being referred to as Malvertising. Malware distribution via web ads on major sites (including msn.com, nytimes.com, bbc.com, aol.com, my.xfinity.com, nfl.com, realtor.com, theweathernetwork.com, thehill.com, and newsweek.com) has recently been discovered. According to Malwarebytes, the affected networks included those owned by Google, AppNexis, AOL, and Rubicon. The attacks are flowing from two suspicious domains, including trackmytraffic[c].biz and talk915[.]pw.
Malvertising is now considered the leading threat vector, overtaking porn. Almost 1 in 5 cyber attacks is now through malvertising.
What can I do?
The only real way to prevent cyberattacks is to stop them from activating in the first place. BlackFog Privacy is designed to specifically block malware execution by disrupting their bidirectional communication back to their command centers.
By preventing activation, the malware has no way to activate and therefore is prevented from being installed on your computer.
BlackFog’s entire focus is on prevention. Rather than focusing on known vulnerabilities using perimeter defense techniques (at the Firewall) or signature based detection, such as virus and spyware scanners, BlackFog stops the activation and replication of new threats before they can cause any damage.
Related Posts
Data Backup and Data Recovery: What Every Business Needs to Know
Understand these critical data backup and data recovery steps to reduce the risk of lengthy downtime following data loss.
DNS Exfiltration: How Hackers Use Your Network to Steal Data Without Detection
Learn how DNS exfiltration works and why this method of data theft often goes undetected.
How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security
Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.
5 Steps to a Disaster Recovery Plan That Protects Your Business
Follow these key steps to develop a data backup and recovery plan fit for the digital-first world.
Data Protection Management: Building a Resilient Data Security Framework
Keep these six key principles in mind to ensure your data protection management solutions are as effective as possible.
Data Leakage Demystified: Risks and Mitigation Strategies
Learn everything you need to know about common data leakage risks and how to mitigate them.