Federal Computers Could Be Infected By Invisible Malware

scyther5 via Shutterstock

AA Font size + Print

Media sites are more likely to be infected by malware than enterprise networks, according to a new report. By Aliya Sternstein

A surge of malicious software hit news media websites during the first half of 2014, unleashing a threat to federal agencies that rely on those sites to get information, cybersecurity researchers say.

Media networks were almost four times as likely to attract malware as the average enterprise network, likely because of an increasingly popular hacking tactic called “malvertising,” according to a new Cisco threat intelligence report.

Web publications are magnets for online ads that harbor malware and pass it on to readers. The media industry depends on advertising for revenue, but ads are hardly ever vetted for subversive code.

Even folks in federal government-land use the Web to do their job — they are using the same sites that we all use,” Levi Gundert, a technical leader for Cisco’s threat research, analysis and communications team, said in an interview. “And because of the way malvertising works, they are just as susceptible to being automatically redirected to some exploit kit site or some other malicious-type sites really seamlessly.”

A malvertiser who wants to target a specific population at a certain time — for example, government officials following the November elections — can pay a legitimate ad exchange to place malicious ads on news sites during that time. Sometimes, the hacker pays up and instructs the exchange to serve the ad as quickly as possible, leaving little time for vulnerability testing, Cisco researchers found.

The infection is invisible to the user.

There is no user click involved — just load the page and the next thing you know, you are redirected, and that’s because of the relationship these websites have with the ad exchanges,” Gundert said.

During the past six months, between 5 and 10 percent of Cisco customers’ malicious traffic was related to malvertising.

The scheme has been around for years, but the acceleration in ad exchange abuse is pretty significant, he said.  

Adversaries launching exploits and other scams around high-profile events, such as the 2014 Winter Olympic Games and the Academy Awards, and big news stories, such as the Malaysia Airlines Flight 370 mystery and the South Korean ferry disaster, are likely reasons for the increase in encounters for the media and publishing industry,” states the report, which is slated for release Tuesday. 

Last month, malvertising apparently showed up on radio host Glenn Beck’s publication TheBlaze.com, and there were reports in January of poisonous advertising on The Moscow Times newspaper .

No government defense plan for malvertising really exists, said Gundert, a former Secret Service special agent.

Some computer security tools prevent ads from appearing, but they are not always effective.

“If you are requesting CNN.com, it is probably not going to block the request, and if the advertisement that’s coming in gets served up with CNN.com, it is probably not going to block that because it’s a legitimate advertisement,” he said.  

Some departments, such as Homeland Security and Justice, impose stricter surfing restrictions – but, again, not with the best outcomes.

Access controls are put in place “so they can lower the attack surface based on what they believe is reasonable for your job function,” Gundert said. “Even after all of that, they are not going to block certain news sites … and ultimately, those ads can end up there. It’s a very tricky problem to solve without blocking legitimate content.”

Elsewhere in the world, governments were more successful at containing malware during the first half of 2014.

The number of crimeware kits sold in online black markets dropped by 87 percent after Russian authorities last fall arrested “Paunch,” the alleged creator of the “Blackhole” kit.

Gundert called the apprehension “a huge coup,” adding that “Paunch had the market locked up for exploit kits.”

It might strike some as odd for Russia, which recently urged its citizens wanted by U.S. authorities for cybercrimes to take a staycation or risk extradition, to take down a hacker. 

“They don’t really have an interest in apprehending cybercriminals that are targeting the West, but what we’ve seen historically is that if you decide you are going to target Russian citizens, Russian banks, Russian businesses, then all the sudden, you are fair game to Russian law enforcement,” Gundert said. “My guess is that Paunch was targeting and-or victimizing Russians, and that’s what ultimately led to his downfall.” 

Close [ x ] More from DefenseOne

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.


When you download a report, your information may be shared with the underwriters of that document.