A suspect based in Hong Kong is believed to be the main culprit behind a wave of malicious ads that have invaded Microsoft apps and services over the past few months.
The suspect is believed to be a Hong Kong man who operates at least two front companies named Fiber-Ads and Clockfollow, according to an investigation shared with ZDNet this week by Confiant, a cyber-security firm specialized in tracking malvertising campaigns.
Confiant says the suspect uses the two companies to place ads with legitimate ad networks. Malicious code hidden in the ads hijacks users viewing the ads, and redirect them to other sites.
The suspect then uses an account on MyMediaAds, a platform for online advertisers, to sell the hijacked traffic to other threat actors, redirecting users from legitimate apps and websites to sites pushing fake antivirus apps, Flash updates, tech support sites, and other scams.
Over 100 million bad ads in 2019 alone
Based on its internal data, Confiant said this Hong Kong-based threat actor has been responsible for over 100 million bad ad impressions this year alone.
"Desktop and mobile devices are targeted in relatively equal quantities, but desktop Windows and iOS are heavily favored by the attacker," said Eliya Stein, a Senior Security Engineer at Confiant.
While most of the bad ads coming from this threat actor have been displayed via web ads, some of them have also reached Windows apps and Microsoft services.
The process work as follows: a user opens a Microsoft app, the app loads an ad, the malicious code in the ad opens the user's default browser to a malicious URL.
However, this threat actor's malvertising activity goes beyond showing ads in Microsoft apps, which Confiant described as "just spillover from this bad actor's already active and disruptive malvertising rampage."
Hong Kong -- malvertisers' heaven
The same threat actor has also been seen selling hijacked traffic from popup ads delivered to US users.
Over the last few weeks, Confiant has been working with the impacted ad platforms to ban the Hong Kong-based threat actor.
"During our investigation, a platform had confirmed that the buyer behind the campaigns was based out of Hong Kong," Stein told ZDNet in an interview.
"A growing number of malicious actors in the ad ecosystem are setting up business in Hong Kong where they are somewhat insulated from legal consequences while running their activities in the open," he added.
"We're hoping this article will shed some light into this phenomenon and we're happy to share such findings with law enforcement in the future."
ZDNet reached out for comment to the two email addresses listed on the Fiber-Ads and Clickfollow websites; however, we did not receive a reply before this article's publication.
Related malware and cybercrime coverage:
- Brazil is at the forefront of a new type of router attack
- Malicious Python libraries targeting Linux servers removed from PyPI
- Hackers breached Greece's top-level domain registrar
- New Android malware replaces legitimate apps with ad-infested doppelgangers
- Pale Moon says hackers added malware to older browser versions
- OpenNIC drops support for .bit domain names after rampant malware abuse
- Malware lingers in SMBs for an average of 800 days before discovery TechRepublic
- Government imposter scams just hit an all-time high, FTC says CNET