AllBlock malicious ad blocker injects new ads into browser

Experts from Imperva discovered the malicious ad blocker AllBlock, a browser extension, which fulfills its task, also but injects hidden affiliate links into the browser.

The extension is still available in the Chrome Web Store and is positioned as a tool for blocking ads on YouTube and Facebook, including to combat pop-ups and speed up browsing.

Researchers say AllBlock indeed fights advertising, but only to implement its own. For example, AllBlock forces legitimate URLs to redirect users to affiliate links controlled by the extension’s developers.

This allows fraudsters to make money from advertising themselves or to redirect people to affiliate sites to earn royalties from affiliates.the researchers say.

Specialists discovered the strange AllBlock activity back in August 2021, when they identified a number of previously unknown malicious domains distributing a script to inject ads. The script sent legitimate URLs to the remote server and received a list of domains to redirect in response. If a user clicked on a link modified in this way, he was redirected to another page (usually an affiliate link).

AllBlock activity

In addition, the script can evade detection, for example, stays out of sight of large search engines, clears the debug console every 100 ms and actively detects Firebug variables.

After examining the AllBlock blocker in more detail, the Imperva team discovered this script (bg.js), which injects the code into each new tab opened in the browser. To inject a malicious script, the extension connects to a URL on allblock.net, which returns the script in base64, after which it will be decoded and embedded into the page. At the same time, the developers of the extension even added several harmless objects and variables to the malicious code fragment, trying to hide its malicious functions.

How AllBlock is advertised and distributed is not yet clear, but Imperva experts believe that scammers may use other extensions in this campaign. For example, they managed to find some evidence that the same IP addresses and domains link this extension to the malicious Pbot campaign, which has been active since at least 2018.

Let me remind you that Strange malware prevents victims from visiting pirate sites.

Helga Smith

I was always interested in computer sciences, especially data security and the theme, which is called nowadays "data science", since my early teens. Before coming into the Virus Removal team as Editor-in-chief, I worked as a cybersecurity expert in several companies, including one of Amazon's contractors. Another experience: I have got is teaching in Arden and Reading universities.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button