Malware Targeting Smartphones via Three DSP Providers
#1
Quote:A new technique to escape malware detection has been used in a malicious campaign targeting smartphones, according to The Media Trust.

In today’s blog post, Michael Bittner, digital security and operations manager at The Media Trust, revealed that the campaign involved third-party code that enabled smart malware delivery. The malware, dubbed JuiceChecker-3PC by The Media Trust's digital security and operations (DSO) team, was able to bypass scanning using Base64 and has been seen in millions of page views over the last three weeks.

After bypassing the scanning, the malware checked to see whether the user agent was mobile specific, whether the battery level ranged between 20–76% and whether the referrer was specified. If these conditions were met, the malware triggered a redirect in which the ad viewer was delivered to a malicious site.
The targets included three global demand-side platform (DSP) providers, all of which traditionally see checks for similar conditions, with the exception of the battery-level range.

Source: https://www.infosecurity-magazine.com/ne...hones-via/
[-] The following 2 users say Thank You to silversurfer for this post:
  • harlan4096, mekelek
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AV-Comparatives: Endpoint Prevention & R...
AV-Comparatives ha...harlan4096 — 08:51
MediaTek Dimensity 9500 announced with u...
MediaTek announces...harlan4096 — 07:53
AppCheck Anti-Ransomware 3.1.43.7
Version 3.1.43.7 (...harlan4096 — 07:01
uBOLite 2025.921.2008
uBOLite 2025.921.2...harlan4096 — 06:58
K-Lite Codec Pack 19.2.0 / 19.2.2 Update
Changes in 19.2.2 ...harlan4096 — 08:31

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (38)fapedDow
avatar (48)pohudidere
avatar (38)eqiduseb
avatar (40)maskbSleew

[-]
Online Staff
There are no staff members currently online.

>