'Click fraud' becomes entry route for ransomware attacks

Multiple ransomware attacks can be launched in just two hours, stemming from click fraud

Hackers are using click fraud, the act of clicking repeatedly on a web advert to drain advertisers' revenues, as the most common way to distribute ransomware.

This is according to threat detection firm Damballa's Q2 2015 State of Infections report, which analysed click fraud malware RuthlessTreeMafia, introduced by the Asprox botnet.

Devices running the bot generated fake clicks on ads, cheating advertisers out of millions of pounds of revenues. Damballa estimated it was costing businesses $6.3 billion (4 billion) a year, making it a serious threat to the advertising industry.

When the botnet was in control of Damballa's infected test device, those behind RuthlessTreeMafia sold access to the host to other threats that used downloaders to install the Rerdom and Rovnix Trojans.

The test device also became infected with CryptoWall ransomware, used to encrypt files on the device, demanding a payment from the victim to decrypt them. The chain continues, with more ransomware and malware being installed on devices, making the original attacker more money and digging the victim deeper into trouble.

After just two hours, the device picked up three further click fraud attacks, showing the speed in which one click fraud attack could escalate.

"As this report highlights, advanced malware can quickly mutate and it's not just the initial infection vector that matters, it's about understanding the chain of activity over time," Stephen Newman, CTO Damballa said. "The intricacies of advanced infections mean that a seemingly low risk threat - in this case click fraud - can serve as the entry point for far more serious threats.

"The changing nature of these attacks, underscores the importance of being armed with advanced detection, to combat these more stealthy threats. As infections can spread quickly through the network, security teams should take proactive measures to avoid becoming a cautionary click-fraud tale."

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Hackers could use new Wslink malware in highly targeted cyber attacks
malware

Hackers could use new Wslink malware in highly targeted cyber attacks

1 Nov 2021
FBI raids Chinese POS business following cyber attack claims
malware

FBI raids Chinese POS business following cyber attack claims

27 Oct 2021
Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021

Most Popular

How to move Microsoft's Windows 11 from a hard drive to an SSD
Microsoft Windows

How to move Microsoft's Windows 11 from a hard drive to an SSD

4 Jan 2022
Microsoft Exchange servers break thanks to 'Y2K22' bug
email delivery

Microsoft Exchange servers break thanks to 'Y2K22' bug

4 Jan 2022
How to speed up Windows 11
Microsoft Windows

How to speed up Windows 11

7 Jan 2022