Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads

Posted on September 17, 2025September 17, 2025 By CWS

The digital promoting ecosystem has change into a major looking floor for cybercriminals, who’re more and more exploiting promoting know-how corporations to distribute malware and conduct malicious campaigns.

Fairly than merely abusing legit platforms, risk actors at the moment are working because the platforms themselves, creating a classy net of deception that leverages the inherent complexity and fragmentation of the adtech provide chain to keep away from accountability.

Latest investigations have uncovered a large operation involving Vane Viper, a risk actor that has appeared in roughly half of buyer networks monitored by safety researchers, producing about one trillion DNS queries over the previous 12 months.

This operation advantages from a whole lot of 1000’s of compromised web sites and strategically positioned commercials throughout gaming, procuring, and weblog websites worldwide.

The actor’s infrastructure spans roughly 60,000 domains, representing solely a fraction of the broader malicious ecosystem they management.

The sophistication of this marketing campaign lies in its rigorously constructed company construction designed for believable deniability.

Company filings hint Vane Viper to AdTech Holding, a Cyprus-based firm whose flagship subsidiary, PropellerAds, operates as each an promoting community and site visitors dealer.

Key firm relationships (Supply – Infoblox)

Infoblox researchers recognized compelling proof suggesting that PropellerAds has moved past merely turning a blind eye to prison abuse of their platform, with indicators pointing to a number of ad-fraud campaigns originating immediately from infrastructure attributed to the corporate.

The malvertising operation employs a fancy site visitors distribution system (TDS) that routes customers by means of a number of layers of redirection earlier than delivering malicious payloads.

This strategy permits the actors to serve legit content material to automated safety instruments whereas directing human customers to malicious locations.

The marketing campaign’s attain extends past conventional malware distribution, encompassing faux procuring websites, fraudulent browser extensions, survey scams, and grownup content material designed to maximise revenue from compromised site visitors.

Push Notification Persistence Mechanism

Probably the most insidious side of Vane Viper’s operation includes the abuse of browser push notifications to realize persistent entry to sufferer units.

The marketing campaign makes use of malicious service staff, JavaScript recordsdata that intercept community requests between net purposes and servers, to control browser conduct and preserve long-term entry to compromised programs.

PropellerAds displaying the place they sit within the digital promoting ecosystem (Supply – Infoblox)

These service staff make use of script chaining strategies to abuse push notifications, with probably the most regarding factor being their use of the eval() operate to execute arbitrary content material fetched from distant URLs.

The distant URL is decided by hardcoded domains inside the service employee, making a dynamic command and management mechanism that may adapt to altering operational necessities.

As soon as customers settle for push notifications, their units change into a part of a persistent malvertising community, enabling a steady stream of malicious commercials.

The operation demonstrates outstanding resilience by means of its area administration technique, biking by means of 1000’s of newly registered domains every month whereas sustaining key push notification domains for years.

Evaluation reveals that almost all operational domains stay energetic for lower than a month, with registration counts reaching 3,500 domains in peak months, whereas core infrastructure domains like omnatuor.com, propeller-tracking.com, and numerous push notification providers together with in-page-push.com and pushimg.com have maintained operations for over 1,200 days, making certain operational continuity regardless of takedown makes an attempt.

Free reside webinar on new malware ways from our analysts! Be taught superior detection strategies -> Register for Free

Cyber Security News Tags:Abuse, Actors, Ads, Adtech, Companies, Malicious, Target, Threat, Users

Post navigation

Previous Post: PureHVNC RAT Developers Leverage GitHub Host Source Code
Next Post: Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service

Related Posts

Threat Actors Weaponize ChatGPT and Grok Conversations to Deploy AMOS Stealer Cyber Security News
Coyote Malware Abuses Microsoft’s UI Automation in Wild to Exfiltrate Login Credentials Cyber Security News
Linux Kernel ksmbd Filesystem Vulnerability Exploited Cyber Security News
Chinese Hackers Leverage Geo-Mapping Tool to Maintain Year-Long Persistence Cyber Security News
Retail Finance Giant SitusAMC Data Breach Exposes Accounting Records and Legal Agreements Cyber Security News
New FortiWeb 0-Day Code Execution Vulnerability Exploited in the Wild Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OpenAI GPT-5.2-Codex Supercharges Agentic Coding and Cyber Vulnerability Detection
  • China-Aligned Threat Group Uses Windows Group Policy to Deploy Espionage Malware
  • New Udados Botnet Launches Massive HTTP Flood DDoS Attacks Targeting Tech Sector
  • UEFI Vulnerability in Major Motherboards Enables Early-Boot Attacks
  • HPE Patches Critical Flaw in IT Infrastructure Management Software

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark