{"id":10973,"date":"2025-02-25T07:55:15","date_gmt":"2025-02-25T15:55:15","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=10973"},"modified":"2025-02-25T07:16:53","modified_gmt":"2025-02-25T15:16:53","slug":"the-hidden-dangers-of-malicious-adtech","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/","title":{"rendered":"The Hidden Dangers of Malicious Adtech"},"content":{"rendered":"<p>The stereotypical picture of a hooded figure hacking from a basement is a misguided one when it comes to the threat actors behind many cybercrimes. Malicious adtech is a prime example. This type of cyberthreat is carried out not by lone individuals, but by professional organizations with many affiliates. On the surface, these entities may appear legitimate, which is how they snare their victims. In this post, we provide a brief overview of what this dishonest variant of adtech is, why it is dangerous and how DNS-based threat intelligence is uniquely suited to protect against it.<\/p>\n<h3>What Is Adtech and When Does It Become Malicious?<\/h3>\n<p>Advertising technology, aka adtech, is the collection of technologies and tactics marketeers use to increase the effectiveness of their efforts by engaging online audiences in a highly targeted fashion. Google AdSense is a well-known example of adtech you may be familiar with. If you\u2019ve ever noticed that websites you visit are suddenly showing ads from products you\u2019ve recently researched elsewhere, you\u2019ve seen adtech in action.<\/p>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-figure1-v6.png\" alt=\"Figure 1: The three main participants in adtech.\" \/><\/p>\n<p class=\"image-caption\">Figure 1: The three main participants in adtech.<\/p>\n<p>Adtech involves three groups of key players: publishers, advertisers and operators.<\/p>\n<ul class=\"list-spacing\">\n<li>Publishers typically own a website containing content of interest to a specific audience. They look to monetize their online platform. Examples of publishers include news outlets, weather forecasting, specific interest groups, etc.<\/li>\n<li>Advertisers look to grab attention from potential buyers by sending promotional content, like banners ads, videos, sponsored articles and more. Advertisers always look to reach the right audience for their promoted services or products.<\/li>\n<li>Operators, like Google, act as the exchange between advertisers and publishers. They allow publishers to register their website with them and enable advertisers to place digital ads directly onto the publisher&#8217;s online presence. Operators take payments from the advertisers and pay publishers. Operators also provide advertisers the tools to find the right publishing sites that match audiences of interest.<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"blog-image\" src=\"\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-figure2-v2.png\" alt=\"Figure 2: As with legitimate adtech, the malicious variation uses a traffic distribution system to deliver the right content to the right person at the right moment.\" \/><\/p>\n<p class=\"image-caption\">Figure 2: As with legitimate adtech, the malicious variation uses a traffic distribution system to deliver the right content to the right person at the right moment.<\/p>\n<p>Malicious adtech follows the same processes. Publishers, sometimes also called affiliates, offer their compromised websites to an operator, and let the operator redirect victims to a malicious advertiser. Sometimes the operator will compromise websites themselves. At the center of this process is a traffic distribution system (TDS) created by the operator with advanced capabilities, like browser profiling, decoy sites to mislead scanning tools and cloaking services to protect the malicious domains.<\/p>\n<p>Criminal organizations use malicious adtech to bring victims into their illegal schemes. It is a key enabler of fake applications, malware delivery, credential theft and the selling of fraudulent digital products and services, among many other cyberthreats.<\/p>\n<h3>Why Is Malicious Adtech So Dangerous?<\/h3>\n<p>There are many reasons why malicious adtech is harmful. Here is a brief look at some of the most critical.<\/p>\n<p><strong>Operators Are Hard to Disrupt<\/strong><\/p>\n<p>The organizations that operate malicious adtech have access to or are capable of creating infrastructure of considerable scale. That infrastructure can include thousands of compromised sites to trick users, a maze of thousands of domains used to redirect victims and high-volume usage of browser push-notification services. In addition, these adtech operations are often organized into multiple entities to keep activities separate to hide their intent \u2014from advertisement creation to fake CAPTCHAs, surveys, scam pages and even malicious downloads. These services combine into a formidable adversary that leverages sophisticated digital tactics to carry out cybercrime while avoiding legal scrutiny. As a result, some of these operators, like VexTrio Viper, have existed for years, have become highly profitable, and their activities may well continue for a long time.<\/p>\n<p><strong>Deception Impacts Organizational Security<\/strong><\/p>\n<p>Malicious adtech tricks victims into engaging with content they are eager to access, often cleverly mimicking popular brands, so that victims lower their guards and initiate a high-risk action. For instance, once a victim engages by visiting a compromised site, the operator may send a fake CAPTCHA that lures the victim into accepting browser push notifications from a malicious advertiser. These notifications, in turn, may now contain even more fraudulent content, pushing users down a dangerous rabbit hole.<\/p>\n<p>Receiving unwanted push notifications can have substantial implications for users and the organizations they belong to. For example, when a victim interacts with browser notifications mimicking legit applications, they may get tricked into downloading unverified software, sharing personal information or entering their organizational credentials. The tendency for so many of us to spend time on our smartphones during and after work hours makes malicious adtech a serious cybercrime enabler. Personal smart phone push notifications in combination with reconnaissance information allow actors to phish for business credentials or execute multi-factor authentication (MFA) bombing, where victims are flooded with MFA prompts by advertisers or operators. By combining earlier captured credentials with MFA bombing, cybercriminals can gain unauthorized access to enterprise assets resulting in costly data leakages, ransomware attacks and brand damage.<\/p>\n<p><strong>Some Impacts of Malicious Adtech Persist<\/strong><\/p>\n<p>Malicious adtech is also vexing because once a victim has been drawn in, the distorted information stream created from fake advertisements remains, even after the victim has cleared browser caches or performed other hygiene measures.<\/p>\n<p><strong>Security Controls Become Ineffective<\/strong><\/p>\n<p>Evasion from security research tools is one of the primary reasons that criminal adtech remains so widespread. By profiling visitors\u2019 browsers, TDSs can cloak advertiser sites from commonly used security scanners and threat research tools. Even more, when the TDS senses that a browser\u2019s settings are more secure, it will route the incoming connection to a benign decoy site to throw threat investigators off the trail.<\/p>\n<p>Cybercriminals, such as VexTrio Viper, use these counterintelligence tactics to reduce their risk of discovery by threat intel teams. By redirecting intelligence-gathering crawling tools to decoy sites, operators interrupt the production of tactical threat intelligence on which automated detection and blocking mechanisms rely. Bottomline, malicious adtech reduces the effectiveness of existing security controls largely because the used TDSs ensure that security vendors do not encounter the pages that ultimately host malicious content or payloads. <\/p>\n<p><strong>Targeting Victims with Custom Content<\/strong> <\/p>\n<p>Instead of executing broad \u201cspray and pray\u201d attacks, TDSs allow adversaries to deliver custom content to the right victim. By executing advanced reconnaissance via social media or other available victim data, actors can craft uniquely created packages in hyper-personalized fashion trusted by the victim. These packages can deliver actor-controlled versions of common IT-admin tools like remote management solutions (RMMs) already used in the environment. This strategy of weaponizing existing IT tools allows actors to carry out malicious activities without being discovered.<\/p>\n<p><strong>The Value of DNS in Detecting Malicious Adtech<\/strong><\/p>\n<p>Harmful adtech thrives because it deceives victims and evades detection by most security tools. Traditional tools are only effective once a protected device has been exposed to a malicious payload and patient zero\u2019s information is collected. In contrast, data from Domain Name System (DNS) records reveals when and how new malicious infrastructure is configured. Researchers who leverage real-time and historical DNS data combined with innovative data science can identify suspicious or malicious domains before any payload gets delivered, including those used in malicious adtech.<\/p>\n<p>DNS-derived intelligence illuminates the infrastructure behind the threat, including how TDSs work and how they redirect traffic. Unlike any other security methodology, DNS-based security implementations can proactively uncover malicious adtech and block internet-connected endpoints from engaging with it. DNS also does not live within a single IT area. It acts holistically across any internet-connected device whether it is mobile, desktop or cloud instance, enabling security teams to achieve a true proactive security posture. In simple terms, by focusing on the operator infrastructure, DNS-based security tools break the supply chain between malicious advertisers and victims, providing long-term protection instead of focusing on the latest payloads.<\/p>\n<p><strong>Protecting Against Malicious Adtech with DNS Security and Threat Intelligence<\/strong><\/p>\n<p>Threat actors keep evolving. The rising use of deceptive adtech together with its entrenched infrastructure and evasion techniques pose substantial risks in our increasingly connected digital age. The organizations that operate malicious adtech profit from it and are adept at avoiding legal repercussions, so their activities are likely to continue.<\/p>\n<p>The tactics used in their deceptions are sophisticated enough that even the most security-conscious among us can be tricked into entering a malicious adtech network\u2014and with no easy way out.<\/p>\n<p>Through the enhanced visibility they provide, DNS-based security and threat intelligence are the best measures available today to expose criminal adtech operations and prevent users from connecting to its corrupt domains.<\/p>\n<p>To learn more about Infoblox Threat Intelligence Research visit <a href=\"https:\/\/www.infoblox.com\/threat-intel\/\" target=\"_blank\"><strong>https:\/\/www.infoblox.com\/threat-intel\/<\/strong><\/a>.<\/p>\n<p>Request DNS Security Workshop<br \/>\n<a href=\"https:\/\/info.infoblox.com\/sec-ensecurityworkshop-20240901-registration.html\" target=\"_blank\"><strong>https:\/\/info.infoblox.com\/sec-ensecurityworkshop-20240901-registration.html<\/strong><\/a><\/p>\n<style>\n.code-format {\n\tfont-family: 'Courier New';\n}\n.image-caption {\n    font-size: 12px;\n}\n.list-spacing li{margin-bottom:20px}\nol.list-spacing > li::marker {\n    font-weight: 700;\n}\n<\/style>\n<p><script>\njQuery('.single h1').html('The Hidden Dangers of <span class=\"gradient\">Malicious Adtech<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The stereotypical picture of a hooded figure hacking from a basement is a misguided one when it comes to the threat actors behind many cybercrimes. Malicious adtech is a prime example. This type of cyberthreat is carried out not by lone individuals, but by professional organizations with many affiliates. On the surface, these entities may [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":11011,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[1148,902,1151,1152,1153],"class_list":{"0":"post-10973","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-malicious-adtech","9":"tag-tds","10":"tag-defense-evasion","11":"tag-victim-deception","12":"tag-dns-based-defense","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Actors deceive victims and evade defenses using malicious adtech<\/title>\n<meta name=\"description\" content=\"Learn why malicious adtech is a risk for organizations of all sizes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Actors deceive victims and evade defenses using malicious adtech\" \/>\n<meta property=\"og:description\" content=\"Learn why malicious adtech is a risk for organizations of all sizes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T15:55:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"408\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Actors deceive victims and evade defenses using malicious adtech\" \/>\n<meta name=\"twitter:description\" content=\"Learn why malicious adtech is a risk for organizations of all sizes\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"The Hidden Dangers of Malicious Adtech\",\"datePublished\":\"2025-02-25T15:55:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/\"},\"wordCount\":1441,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg\",\"keywords\":[\"Malicious AdTech\",\"TDS\",\"Defense evasion\",\"victim deception\",\"DNS Based Defense\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/\",\"name\":\"Actors deceive victims and evade defenses using malicious adtech\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg\",\"datePublished\":\"2025-02-25T15:55:15+00:00\",\"description\":\"Learn why malicious adtech is a risk for organizations of all sizes\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg\",\"width\":612,\"height\":408},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/the-hidden-dangers-of-malicious-adtech\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Hidden Dangers of Malicious Adtech\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Actors deceive victims and evade defenses using malicious adtech","description":"Learn why malicious adtech is a risk for organizations of all sizes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/","og_locale":"en_US","og_type":"article","og_title":"Actors deceive victims and evade defenses using malicious adtech","og_description":"Learn why malicious adtech is a risk for organizations of all sizes","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/","og_site_name":"Infoblox Blog","article_published_time":"2025-02-25T15:55:15+00:00","og_image":[{"width":612,"height":408,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Actors deceive victims and evade defenses using malicious adtech","twitter_description":"Learn why malicious adtech is a risk for organizations of all sizes","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"The Hidden Dangers of Malicious Adtech","datePublished":"2025-02-25T15:55:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/"},"wordCount":1441,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg","keywords":["Malicious AdTech","TDS","Defense evasion","victim deception","DNS Based Defense"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/","name":"Actors deceive victims and evade defenses using malicious adtech","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg","datePublished":"2025-02-25T15:55:15+00:00","description":"Learn why malicious adtech is a risk for organizations of all sizes","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/the-hidden-dangers-of-malicious-adtech-thumbnail.jpg","width":612,"height":408},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/the-hidden-dangers-of-malicious-adtech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"The Hidden Dangers of Malicious Adtech"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=10973"}],"version-history":[{"count":14,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10973\/revisions"}],"predecessor-version":[{"id":11061,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/10973\/revisions\/11061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/11011"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=10973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=10973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=10973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}