May 30, 2017 By Larry Loeb 2 min read

Malvertising is one of the biggest schemes that users have to watch out for when surfing the web, and the challenge of avoiding it may only be getting worse as scams become more sophisticated. For example, a recent Malwarebytes report revealed that RoughTed, a sophisticated malvertising campaign designed to bypass ad-blocking software, may have been active for over a year before it was first detected in March 2017.

The firm reported that visits to the malware’s domain totaled 500 million in the past three months. The U.S. and Canada were the hardest hit regions, followed by the U.K., Italy, Spain and Brazil. Researchers also discovered that Rig and Magnitude are among the most frequently delivered exploit kits (EKs).

Malvertising Leaks Through Ad Blockers

Attackers are performing redirections using dynamically created scripts to subvert ad blockers, according to the report. The script gets its data from a different URL every day, which makes URL blocking difficult. Users of Adblock Plus, uBlock Origin and AdGuard have reported malvertising getting through the blockers, the researchers said.

Although the malware drives traffic to its domains from many sources, it mainly uses rogue ads that contain embedded scripts. Since it also uses various fingerprinting techniques, RoughTed can deliver different malicious payloads depending on the victim’s configuration.

Fingerprinting for Custom Payloads

“[T]here is some aggressive fingerprinting, which I think most ad networks wouldn’t do because it’s very privacy invasive,” a Malwarebytes researcher told Bleeping Computer. The fingerprinting includes tests for browser type, operating system (OS), language settings and geolocation information. Another check scans for installed fonts in the victim system, which varies based on the victim’s OS.

A victim may be redirected to a number of targets specifically designed for his or her OS. These include tech support scam pages, download pages for Mac adware, download pages for Windows potentially unwanted programs (PUPs), rogue Chrome extensions and pay-per-install schemes that depend on the App Store or iTunes.

Users with ad-blocking software must be on guard against such a sophisticated campaign. Do not download supposed updates that come from unverified sites. Additionally, be sure to carefully check URLs to determine which sites are sending and receiving information.

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today