Malware Targeting Smartphones via Three DSP Providers
#1
Quote:A new technique to escape malware detection has been used in a malicious campaign targeting smartphones, according to The Media Trust.

In today’s blog post, Michael Bittner, digital security and operations manager at The Media Trust, revealed that the campaign involved third-party code that enabled smart malware delivery. The malware, dubbed JuiceChecker-3PC by The Media Trust's digital security and operations (DSO) team, was able to bypass scanning using Base64 and has been seen in millions of page views over the last three weeks.

After bypassing the scanning, the malware checked to see whether the user agent was mobile specific, whether the battery level ranged between 20–76% and whether the referrer was specified. If these conditions were met, the malware triggered a redirect in which the ad viewer was delivered to a malicious site.
The targets included three global demand-side platform (DSP) providers, all of which traditionally see checks for similar conditions, with the exception of the battery-level range.

Source: https://www.infosecurity-magazine.com/ne...hones-via/
[-] The following 2 users say Thank You to silversurfer for this post:
  • harlan4096, mekelek
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard Browser Extension 5.2.77
More information a...harlan4096 — 07:00
Microsoft Edge Version 140.0.3485.81
ersion 140.0.3485....harlan4096 — 06:55
Vivaldi 7.6 Build 3797.55
Vivaldi 7.6 Build ...harlan4096 — 06:54
Virtual-machine escape – in a Spectre v2...
A fresh research p...harlan4096 — 06:53
Windows 11 is getting a video wallpaper ...
Microsoft is testi...harlan4096 — 06:51

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (38)fapedDow
avatar (48)pohudidere
avatar (38)eqiduseb
avatar (40)maskbSleew

[-]
Online Staff
There are no staff members currently online.

>