Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads

Posted on September 17, 2025September 17, 2025 By CWS

The digital promoting ecosystem has change into a major looking floor for cybercriminals, who’re more and more exploiting promoting know-how corporations to distribute malware and conduct malicious campaigns.

Fairly than merely abusing legit platforms, risk actors at the moment are working because the platforms themselves, creating a classy net of deception that leverages the inherent complexity and fragmentation of the adtech provide chain to keep away from accountability.

Latest investigations have uncovered a large operation involving Vane Viper, a risk actor that has appeared in roughly half of buyer networks monitored by safety researchers, producing about one trillion DNS queries over the previous 12 months.

This operation advantages from a whole lot of 1000’s of compromised web sites and strategically positioned commercials throughout gaming, procuring, and weblog websites worldwide.

The actor’s infrastructure spans roughly 60,000 domains, representing solely a fraction of the broader malicious ecosystem they management.

The sophistication of this marketing campaign lies in its rigorously constructed company construction designed for believable deniability.

Company filings hint Vane Viper to AdTech Holding, a Cyprus-based firm whose flagship subsidiary, PropellerAds, operates as each an promoting community and site visitors dealer.

Key firm relationships (Supply – Infoblox)

Infoblox researchers recognized compelling proof suggesting that PropellerAds has moved past merely turning a blind eye to prison abuse of their platform, with indicators pointing to a number of ad-fraud campaigns originating immediately from infrastructure attributed to the corporate.

The malvertising operation employs a fancy site visitors distribution system (TDS) that routes customers by means of a number of layers of redirection earlier than delivering malicious payloads.

This strategy permits the actors to serve legit content material to automated safety instruments whereas directing human customers to malicious locations.

The marketing campaign’s attain extends past conventional malware distribution, encompassing faux procuring websites, fraudulent browser extensions, survey scams, and grownup content material designed to maximise revenue from compromised site visitors.

Push Notification Persistence Mechanism

Probably the most insidious side of Vane Viper’s operation includes the abuse of browser push notifications to realize persistent entry to sufferer units.

The marketing campaign makes use of malicious service staff, JavaScript recordsdata that intercept community requests between net purposes and servers, to control browser conduct and preserve long-term entry to compromised programs.

PropellerAds displaying the place they sit within the digital promoting ecosystem (Supply – Infoblox)

These service staff make use of script chaining strategies to abuse push notifications, with probably the most regarding factor being their use of the eval() operate to execute arbitrary content material fetched from distant URLs.

The distant URL is decided by hardcoded domains inside the service employee, making a dynamic command and management mechanism that may adapt to altering operational necessities.

As soon as customers settle for push notifications, their units change into a part of a persistent malvertising community, enabling a steady stream of malicious commercials.

The operation demonstrates outstanding resilience by means of its area administration technique, biking by means of 1000’s of newly registered domains every month whereas sustaining key push notification domains for years.

Evaluation reveals that almost all operational domains stay energetic for lower than a month, with registration counts reaching 3,500 domains in peak months, whereas core infrastructure domains like omnatuor.com, propeller-tracking.com, and numerous push notification providers together with in-page-push.com and pushimg.com have maintained operations for over 1,200 days, making certain operational continuity regardless of takedown makes an attempt.

Free reside webinar on new malware ways from our analysts! Be taught superior detection strategies -> Register for Free

Cyber Security News Tags:Abuse, Actors, Ads, Adtech, Companies, Malicious, Target, Threat, Users

Post navigation

Previous Post: PureHVNC RAT Developers Leverage GitHub Host Source Code
Next Post: Microsoft Dismantles 300+ Websites Used to Distribute RaccoonO365 Phishing Service

Related Posts

Threat Actors Exploiting DevOps Web Servers Misconfigurations To Deploy Malware Cyber Security News
Bitter APT Hackers Exploit WinRAR Zero-Day Via Weaponized Word Documents to Steal Sensitive Data Cyber Security News
ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News
SSH Keys Are Crucial for Secure Remote Access but Often Remain a Blind Spot in Enterprise Security Cyber Security News
How SOCs Triage Incidents in Seconds with Threat Intelligence Cyber Security News
0-Click ChatGPT Agent Vulnerability Allows Sensitive Data Exfiltration from Gmail Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats
  • Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent
  • New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
  • OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New BOF Tool Exploits Microsoft Teams’ Cookie Encryption allowing Attackers to Access User Chats
  • Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent
  • New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files
  • OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
  • ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News