recommended reading

Invisible Web Infection Poses Threat to Federal Computers

Eugene Sergeev/

A surge of malicious software hit news media websites during the first half of 2014, unleashing a threat to federal agencies that rely on those sites to get information, cybersecurity researchers say.

Media networks were almost four times as likely to attract malware as the average enterprise network, likely because of an increasingly popular hacking tactic called "malvertising," according to a new Cisco threat intelligence report.

Web publications are magnets for online ads that harbor malware and pass it on to readers. The media industry depends on advertising for revenue, but ads are hardly ever vetted for subversive code.

"Even folks in federal government-land use the Web to do their job -- they are using the same sites that we all use,” Levi Gundert, a technical leader for Cisco's threat research, analysis and communications team, said in an interview. “And because of the way malvertising works, they are just as susceptible to being automatically redirected to some exploit kit site or some other malicious-type sites really seamlessly.”

A malvertiser who wants to target a specific population at a certain time — for example, government officials following the November elections — can pay a legitimate ad exchange to place malicious ads on news sites during that time. Sometimes, the hacker pays up and instructs the exchange to serve the ad as quickly as possible, leaving little time for vulnerability testing, Cisco researchers found.

The infection is invisible to the user.

"There is no user click involved -- just load the page and the next thing you know, you are redirected, and that's because of the relationship these websites have with the ad exchanges," Gundert said.

During the past six months, between 5 and 10 percent of Cisco customers' malicious traffic was related to malvertising.

The scheme has been around for years, but the acceleration in ad exchange abuse is pretty significant, he said.  

"Adversaries launching exploits and other scams around high-profile events, such as the 2014 Winter Olympic Games and the Academy Awards, and big news stories, such as the Malaysia Airlines Flight 370 mystery and the South Korean ferry disaster, are likely reasons for the increase in encounters for the media and publishing industry," states the report, which is slated for release Tuesday. 

Last month, malvertising apparently showed up on radio host Glenn Beck's publication, and there were reports in January of poisonous advertising on The Moscow Times newspaper .

No government defense plan for malvertising really exists, said Gundert, a former Secret Service special agent.

Some computer security tools prevent ads from appearing, but they are not always effective.

"If you are requesting, it is probably not going to block the request, and if the advertisement that's coming in gets served up with, it is probably not going to block that because it's a legitimate advertisement," he said.  

Some departments, such as Homeland Security and Justice, impose stricter surfing restrictions – but, again, not with the best outcomes.

Access controls are put in place "so they can lower the attack surface based on what they believe is reasonable for your job function," Gundert said. "Even after all of that, they are not going to block certain news sites . . . and ultimately, those ads can end up there. It's a very tricky problem to solve without blocking legitimate content."

Elsewhere in the world, governments were more successful at containing malware during the first half of 2014.

The number of crimeware kits sold in online black markets dropped by 87 percent after Russian authorities last fall arrested "Paunch," the alleged creator of the “Blackhole” kit.

Gundert called the apprehension "a huge coup," adding that "Paunch had the market locked up for exploit kits.”

It might strike some as odd for Russia, which recently urged its citizens wanted by U.S. authorities for cybercrimes to take a staycation or risk extradition, to take down a hacker. 

"They don't really have an interest in apprehending cybercriminals that are targeting the West, but what we've seen historically is that if you decide you are going to target Russian citizens, Russian banks, Russian businesses, then all the sudden, you are fair game to Russian law enforcement," Gundert said. "My guess is that Paunch was targeting and-or victimizing Russians, and that's what ultimately led to his downfall." 

(Image via Eugene Sergeev/

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.