Блокирането на злонамерени реклами AllBlock инжектира нови реклами в браузъра

Experts from Imperva discovered the malicious ad blocker AllBlock, a browser extension, which fulfills its task, also but injects hidden affiliate links into the browser.

The extension is still available in the Chrome Web Store and is positioned as a tool for blocking ads on YouTube and Facebook, including to combat pop-ups and speed up browsing.

Researchers say AllBlock indeed fights advertising, but only to implement its own. Например, AllBlock forces legitimate URLs to redirect users to affiliate links controlled by the extension’s developers.

This allows fraudsters to make money from advertising themselves or to redirect people to affiliate sites to earn royalties from affiliates.the researchers say.

Specialists discovered the strange AllBlock activity back in August 2021, when they identified a number of previously unknown malicious domains distributing a script to inject ads. The script sent legitimate URLs to the remote server and received a list of domains to redirect in response. If a user clicked on a link modified in this way, he was redirected to another page (usually an affiliate link).

AllBlock activity

In addition, the script can evade detection, например, stays out of sight of large search engines, clears the debug console every 100 ms and actively detects Firebug variables.

After examining the AllBlock blocker in more detail, the Imperva team discovered this script (bg.js), which injects the code into each new tab opened in the browser. To inject a malicious script, the extension connects to a URL on allblock.net, which returns the script in base64, after which it will be decoded and embedded into the page. По същото време, the developers of the extension even added several harmless objects and variables to the malicious code fragment, trying to hide its malicious functions.

How AllBlock is advertised and distributed is not yet clear, but Imperva experts believe that scammers may use other extensions in this campaign. Например, they managed to find some evidence that the same IP addresses and domains link this extension to the malicious Pbot campaign, which has been active since at least 2018.

Нека ви го напомня Strange malware prevents victims from visiting pirate sites.

Хелга Смит

Винаги съм се интересувал от компютърни науки, особено сигурността на данните и темата, което се нарича в наши дни "наука за данни", от ранните ми тийнейджърски години. Преди да дойде в екипа за премахване на вируси като главен редактор, Работил съм като експерт по киберсигурност в няколко компании, включително един от изпълнителите на Amazon. Друг опит: Преподавам в университетите Арден и Рединг.

Оставете коментар

Този сайт използва Akismet за намаляване на спама. Научете как се обработват вашите коментарни данни.

Бутон за връщане в началото