Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Malvertising: Hackers are Paying For Ad Space on Popular Websites

b2ap3_thumbnail_click_on_malware_ad_400.jpgA good business practices extreme caution when using the Internet, thanks to hackers using any means possible to unleash threats against organizations of all sizes. You teach your employees how to avoid threats and to avoid suspicious websites, but what if that’s not enough to keep hackers out of your network infrastructure?

Some businesses are finding it increasingly difficult to separate the bad from the good when it comes to online security. This is thanks to a number of new and emerging threats, with the latest one being “malvertising.” This potential threat focuses on using advertising space on websites to inject malicious code into unwary users. This malware often takes advantage of zero-day exploits (problems that haven’t been patched), which means that these threats are difficult to defend against, even under the best circumstances. Take, for instance, a threat described by ComputerWorld:

[...] the source of the infection was a malicious advertisement, one that was running on a mainstream news service! The news website sells ad space served up by an advertising company, which in turn sells that ad space to anybody willing to pay for it. In this case, the bad guys were paying for it. They signed up for ad space just like any other customer, but the advertisement they created — known as “malvertising” — exploited a zero-day (unpatched) vulnerability in Adobe Flash to run commands through the browser to the victim computers’ operating systems, without any knowledge or intervention by the end users.

While taking advantage of multiple avenues of cyber security can be an effective means to combat threats that can compromise your organization’s network, what happens when threats are capable of making themselves invisible to your efforts? This is essentially what happened in the above scenario. Because the malvertisement literally needed no user interaction whatsoever, it was capable of infiltrating the system without being detected, simply because any and all training that employees might have can simply be ignored. Something like this wouldn’t be blocked by a web content filtering system because it’s on a legitimate site.

Thankfully, with the latest cybersecurity tools at your disposal, we can identify and resolve problems like these relatively quickly, should they infiltrate your defenses and set up malware on your network. The important thing to remember about cyber threats is that they will almost always leave some sort of sign that they were there. Be it a virus or piece of malware that’s detected by a firewall, or a phishing email that’s blocked by a spam filter, you’ll know that you’re getting attacked. Even in cases where administrator credentials are used for remote access to your network, you can use your access logs to determine whether or not the account activity is legitimate or not.

Malvertising is a concerning trend to watch out for, to be sure, but in the face of powerful security solutions designed to take proactive measures against online threats, you can bet that it will have some significant difficulty running amok for your business. By taking full advantage of enterprise-level security solutions, your business can detect and eliminate threats in the most secure way possible. For more information, contact Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 30 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Virtualization Business Technology Bandwidth Blockchain Wi-Fi Windows 10 Two-factor Authentication Apps Data Security Mobile Office Vendor Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Networking Apple App Managed Services Voice over Internet Protocol Mobile Device Management BYOD Applications Information Technology Access Control Office 365 Conferencing Hacker How To Avoiding Downtime BDR Marketing HIPAA Computing Risk Management Virtual Private Network Health Big Data Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Computers Managed IT Services 2FA Website Operating System Healthcare Router Display Printer Free Resource Project Management The Internet of Things Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 Social Document Management Solutions Telephone Customer Service Scam Data loss Cooperation Windows 11 Patch Management Going Green Save Money Excel Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Cybercrime Firewall Physical Security Cryptocurrency User Tip Modem Vulnerabilities Computer Repair Safety Processor Mobile Security Virtual Desktop Images 101 Data Privacy Data storage LiFi Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Saving Time Money Humor Employees Customer Relationship Management Managed IT Service Integration Maintenance Antivirus Downloads Sports Mouse Licensing Hacking Presentation Holidays Administration Entertainment Data Storage Wireless Technology Video Conferencing Managed Services Provider Supply Chain Telephone System Virtual Machines Professional Services Robot Cost Management Settings Wireless Word Printing Content Filtering IT Management YouTube VPN Meetings iPhone Entrepreneur Cyber security Tech Scams Username Telework CES 5G Communitications Point of Sale Black Friday Hybrid Work Google Docs Unified Communications Human Resources Experience Database Supply Chain Management Network Management IT Technicians Tech Support Term Bitcoin Cables Running Cable Undo FinTech Proxy Server Cookies IT Assessment Cyber Monday Monitors Google Wallet Google Apps Tactics Flexibility Hotspot Value Organization Mirgation Websites Windows 8 IT Maintenance Laptop Digital Security Cameras Nanotechnology Smart Devices Drones Business Intelligence Memory Electronic Medical Records Shortcuts SharePoint Application Addiction Remote Working Language Management Chatbots Data Breach Google Play Ransmoware Halloween IBM Videos Lenovo Screen Reader Electronic Health Records Distributed Denial of Service Writing Vendors Computing Infrastructure Wasting Time Virtual Reality Be Proactive Service Level Agreement Server Management Identity Trend Micro Private Cloud Security Cameras Hacks Workforce Scary Stories Bookmark Fun Superfish Smart Tech Software as a Service Identity Theft Threats Alerts Managing Costs Twitter Deep Learning Workplace Strategies Download Competition eCommerce Error SSID Meta Education Browsers Connectivity Surveillance Break Fix Virtual Assistant Social Engineering Amazon Virtual Machine Remote Computing Upload Social Network Reviews Multi-Factor Security Medical IT Mobile Computing Outsource IT Environment Media Search User IoT Development Tablet Dark Web Transportation Hypervisor Alert Best Practice Trends Customer Resource management Shopping Managed IT Regulations Optimization File Sharing Google Calendar PowerPoint Dark Data Small Businesses Buisness How To Legal Displays IT solutions IP Address Data Analysis Star Wars Microsoft Excel Employer/Employee Relationships Staff Notifications Navigation Business Growth Gamification PCI DSS Gig Economy Social Networking Travel Legislation Outsourcing Fileless Malware Cortana Techology Recovery Internet Service Provider Google Maps Teamwork Wearable Technology Evernote Alt Codes Workplace Hard Drives Content Regulations Compliance Downtime Domains Health IT Motherboard Memes Unified Threat Management Comparison Hiring/Firing Hosted Solution Paperless Directions Unified Threat Management Assessment Net Neutrality Permissions SQL Server History Typing Co-managed IT Refrigeration Financial Data Public Speaking Smartwatch IT Specifications Network Congestion Technology Care Google Drive Business Communications Lithium-ion battery Microchip Knowledge User Error Internet Exlporer Procurement Fraud Azure

Blog Archive