AllBlock malicious ad blocker injects new ads into browser

Experts from Imperva discovered the malicious ad blocker AllBlock, a browser extension, which fulfills its task, also but injects hidden affiliate links into the browser.

The extension is still available in the Chrome Web Store and is positioned as a tool for blocking ads on YouTube and 臉書, including to combat pop-ups and speed up browsing.

Researchers say AllBlock indeed fights advertising, but only to implement its own. 例如, AllBlock forces legitimate URLs to redirect users to affiliate links controlled by the extension’s developers.

This allows fraudsters to make money from advertising themselves or to redirect people to affiliate sites to earn royalties from affiliates.the researchers say.

Specialists discovered the strange AllBlock activity back in August 2021, when they identified a number of previously unknown malicious domains distributing a script to inject ads. The script sent legitimate URLs to the remote server and received a list of domains to redirect in response. If a user clicked on a link modified in this way, he was redirected to another page (usually an affiliate link).

AllBlock activity

另外, the script can evade detection, 例如, stays out of sight of large search engines, clears the debug console every 100 ms and actively detects Firebug variables.

After examining the AllBlock blocker in more detail, 這 Imperva team discovered this script (bg.js), which injects the code into each new tab opened in the browser. To inject a malicious script, the extension connects to a URL on allblock.net, which returns the script in base64, after which it will be decoded and embedded into the page. At the same time, the developers of the extension even added several harmless objects and variables to the malicious code fragment, trying to hide its malicious functions.

How AllBlock is advertised and distributed is not yet clear, but Imperva experts believe that scammers may use other extensions in this campaign. 例如, they managed to find some evidence that the same IP addresses and domains link this extension to the malicious Pbot campaign, which has been active since at least 2018.

Let me remind you that Strange malware prevents victims from visiting pirate sites.

黑尔加·史密斯

我一直對電腦科學感興趣, 尤其是數據安全和主題, 而家被稱為 "數據科學", 由我十幾歲開始. 在進入病毒清除團隊擔任主編之前, 我曾喺多傢公司擔任網絡安全專家, 包括亞馬遜嘅承包商之一. 另一種體驗: 我在雅頓大學同雷丁大學任教.

留言

本網站使用Akismet嚟減垃圾郵件. 瞭解如何處理評論數據.

“返回頂部”按鈕