Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

BlackTDS Malvertisements On The Rise

You are here:
  1. Home
  2. Blog
  3. BlackTDS Malvertisements On The Rise
Mar262018
BlogCyberSecurity

Date/Time of Report – 20180319 1415

APT/Vector Name – BlackTDS

AKA Names – N/A

Purpose/Target – Cybercriminals consistently utilize Traffic Distribution Systems to determine traffic type, which will aid them in directing users to certain malicious sites and in determining what malicious payloads to execute on particular systems. [1]

Method – Spam, malvertising, distributing malware via fake software updates and other social engineering schemes.

  1. User visits a legitimate website
  2. Website displays and ad from an ad network
  3. User clicks ad and is redirected to the TDS
  4. TDS redirects user to final destination URL. In most cases ad will link to legitimate website for ad. In this case URL is infected with malware.
  5. Computer gets compromised by malware. [2]

  Source –

APT/Vector Intelligence Summary – BlackTDS is a Traffic Distribution System tool that has been advertising its services on black markets since the end of December 2017.

Some malware may also be the end result of a particular TDS’s series of redirections, making it a malware infection vector. TDSs present several challenges with regard to malware sample sourcing and malicious URL detection, as these are capable of detecting the use of security tools and often initiate avoidance tactics. TDSs serve a wide range of functions such as selling pharmaceutical products, exploiting system vulnerabilities using malicious codes. Targeted attacks refer to those that prey on certain users, use various social engineering techniques, and utilize specially crafted malware. TDSs have made it possible for cybercriminals to choose either specific targets or wide-ranging groups, depending on their geographic locations, software preferences, and language settings; to deploy and distribute malware; and to steal critical information. The possibility of blocking redirection to prevent users from landing on bad sites is thus becoming a valid concern.

The use of malicious TDSs to redirect traffic to compromised sites is becoming more common. Preventing product or service consumers from becoming victims will present the security industry with various technological and financial challenges, as the malicious use of various TDSs will require better sourcing techniques, more advanced detection and blocking tactics, as well as greater manpower to ensure efficiency and effectiveness.

Analyst Notes – It is crucial to maintain high level of awareness when clicking banners or links when the user does not recognize the destination of those sources.

Remediation/Avoidance Recommendation – Anti-spam software and malware detection. Maintain cyber awareness. Do not click on ads on work stations.

  1. Goncharov, M. (2011). TRAFFIC DIRECTION SYSTEMS AS MALWARE DISTRIBUTION TOOLS. TendMicro. Retrieved March 19, 2018, from http://www.trendmicro.es/media/misc/malware-distribution-tools-research-paper-en.pdf
  2. https://www.symantec.com/connect/blogs/web-based-malware-distribution-channels-look-traffic-redistribution-systems

 

Please contact us for more information!

 
Author:  Scott A. Johnston and Rafael Brango
Scott A. Johnston is the President and Founder of JohnsTek, Incorporated.
Rafael Brango is a Cybersecurity Analyst in the JohnsTek Miami Security Operations Center.
 
www.johnstek.com
@JOHNSTEK (Twitter)
Categories: Blog, CyberSecurityBy Scott JohnstonMarch 26, 2018
Tags: CybersecurityJohnsTekMalwareVulnerability Assessment

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:Criminal Hacker Organizations Offer Great Customer ServiceNextNext post:JohnsTek Partners with IBM Security!

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer