{"id":12219,"date":"2025-09-16T05:55:12","date_gmt":"2025-09-16T12:55:12","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=12219"},"modified":"2025-09-25T08:24:59","modified_gmt":"2025-09-25T15:24:59","slug":"deniability-by-design-dns-driven-insights-into-a-malicious-ad-network","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/","title":{"rendered":"Deniability by Design: DNS-Driven Insights into a Malicious Ad Network"},"content":{"rendered":"<h3>Executive Summary<\/h3>\n<p>One typically imagines the digital underworld\u2014trojans, malware droppers, fake dating sites, investment scams, and more\u2014as operating in the dark corners of the internet. But increasingly, these threats are hiding in plain sight, camouflaged by the glossy veneer of mainstream digital advertising. In some cases, the adtech platforms are abused, but we have uncovered an increasing number of adtech companies that are either complicit or actively engaged in the distribution of malicious content. Cybercriminals aren\u2019t just exploiting adtech platforms, sometimes, they are the adtech platforms.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11741\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\" alt=\"\" width=\"906\" height=\"573\" \/><\/p>\n<p>There\u2019s a recipe for running malicious campaigns through adtech, and it starts with plausible deniability. Add in convoluted corporate structures, stir in opaque ownership, and you\u2019ve got the perfect conditions for a profitable lack of accountability. These ingredients don\u2019t just make abuse possible; they make it sustainable. The more tangled the web of shell companies, the less visibility there is into the operation, and the harder it becomes to assign blame or trace responsibility, which, of course, is by design.<\/p>\n<p>One such actor, Vane Viper, has appeared in approximately half of our customer networks and has accounted for about 1 trillion DNS queries over the past year, making it one of the most prevalent threat actors we observe. Vane Viper benefits from hundreds of thousands of compromised websites and ads inserted into blogs, gaming, and shopping sites worldwide.<\/p>\n<p>Corporate filings and WHOIS data trace Vane Viper to AdTech Holding, a Cypriot holding company. Their flagship subsidiary, PropellerAds, acts as an advertising network and traffic broker, sourcing traffic from multiple channels, including compromised websites, and routing clicks through its traffic distribution system (TDS) to malicious pages. Although PropellerAds has been implicated in malvertising campaigns by others in the past, proving that they have crossed the line from abused service to complicit enabler has been challenging.<sup>1,2,3,4,5<\/sup> We didn\u2019t come to our conclusions lightly.<\/p>\n<p>For months we debated internally and sought the perspective of other researchers in the security community like Guardio and Confiant, as well as advertising experts like Augustine Fou. Ultimately, we found compelling evidence that not only has PropellerAds turned a \u201cblind eye\u201d to criminal abuse of their platform, but indicators described below suggest\u2014with moderate-to-high confidence\u2014that several ad-fraud campaigns originated from infrastructure attributed to PropellerAds. We have not independently verified that PropellerAds personnel directed these campaigns. When security researchers have previously implicated PropellerAds in malvertising campaigns in the past, Propeller\u2019s standard reply frames findings as \u201clibel\u201d while dismissing responsibility for downstream harm.<\/p>\n<p>Peeling back the layers of ownership and sorting through the shell games AdTech Holding plays, reveal why deniability thrives. Vane Viper\u2019s registrar of choice, URL Solutions\/Pananames, belongs to CloudOne Digital, who acquired XBT Holdings and their subsidiaries Servers.com and Webzilla. PropellerAds owns multiple Webzilla subnets outright and Webzilla itself has a checkered past: its infrastructure was used for the Methbot click-fraud farm, Russia\u2019s Doppelg\u00e4nger disinformation sites, and piracy giant 4shared. Our investigation also uncovered a slew of executives with a history of providing services to fraudsters and financial ties to a Russian oligarch. In the end, the deeper we dug, the clearer it became that plausible deniability isn\u2019t a flaw in the system, but a feature.<\/p>\n<p>This paper provides an in-depth view of Vane Viper, their malicious operations, and their impact as seen via DNS traffic. Combining our research with that of Guardio, GoSecure, and others, we can show that:<\/p>\n<ul class=\"list-spacing\">\n<li>Shared infrastructure and personnel ties connect Vane Viper to Webzilla\/XBT, convicted fraudsters, and Russian oligarchs, blending ostensibly legal adtech with infrastructure and people repeatedly cited for ad fraud, piracy, disinformation, pornography, and gambling traffic (See Figure 1).<\/li>\n<li>Vane Viper has provided core infrastructure in widespread malvertising, ad fraud, and cyberthreat proliferation for at least a decade.<\/li>\n<li>Vane Viper not only brokers traffic for malware droppers and phishers, but appears to run their own campaigns, consistent with previously documented ad-fraud techniques.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11742\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-1.jpg\" alt=\"Figure 1\" width=\"858\" height=\"622\" \/><\/p>\n<p class=\"image-caption\">Figure 1. A diagram of key company relationships<\/p>\n<h3>The Tangled Web<\/h3>\n<p>The name \u201cVane Viper\u201d denotes AdTech Holding, a Cyprus-based holding company of adtech and martech firms. PropellerAds, its most prominent subsidiary, gave us our first clear attribution point to Vane Viper infrastructure. What began as a single attribution soon unraveled into a far more intricate web of malicious adtech, gambling, piracy, pornography, disinformation, and more.<\/p>\n<p>But first, some basics:<\/p>\n<ul class=\"list-spacing\">\n<li><strong>PropellerAds<\/strong> enables publishers of content to monetize their websites with advertising and enables advertisers, who create and pay for ads, to promote their products or services. PropellerAds operates as both a supply-side and demand-side platform, giving them significant control over the supply chain<\/li>\n<li><strong>Publishers<\/strong> are the owners or operators of websites, blogs, or apps that host advertisements. They provide the space where the ads are displayed, earning revenue based on the number of impressions, clicks, or conversions generated by the ads.<\/li>\n<li><strong>Clicks<\/strong> are self-explanatory; however, impressions and conversions may not be. An <strong>impression<\/strong> is how often your ad is shown, whereas a <strong>conversion<\/strong> is an action resulting from an ad interaction and includes such things as answering questions or providing information.<sup>6,7<\/sup><\/li>\n<li><strong>Advertisers<\/strong> are businesses, individuals, or brands that want to promote their products, services, or content. They create ads and pay for them to be displayed to potential customers. Advertisers aim to reach a specific audience to drive traffic, generate leads, or increase sales. In the black hat world, however, advertisers engage in unethical or illegal practices to drop malware; steal credentials, personally identifiable information (PII), or payment information; or artificially inflate advertising revenue. <\/li>\n<li>Additionally, PropellerAds operates as a <strong>traffic broker<\/strong>, aggregating traffic from various sources (including third-party networks) and reselling it to advertisers. Traffic brokering allows advertisers access to a broad audience pool.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11743\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-2.jpg\" alt=\"Figure 2\" width=\"854\" height=\"596\" \/><\/p>\n<p class=\"image-caption\">Figure 2. A diagram from PropellerAds displaying where they sit in the digital advertising ecosystem (Credit: PropellerAds)<\/p>\n<p>PropellerAds ensures that ads are displayed to the right audience to maximize profit for advertisers. Think of them as a sort of advertising \u201cpost office\u201d on the supply side, where they ensure that packages (advertisements) are delivered on time to the right recipients (publishers\u2019 websites). Additionally, on the demand side, they offer services that act as \u201cadvertising ushers,\u201d ensuring users are seamlessly redirected and routed to the most relevant advertisements upon clicking.<\/p>\n<p>We currently assess that about 60,000 domains are part of Vane Viper\u2019s infrastructure. These domains represent only a fraction of the broader ecosystem. TDSs can route users to a virtually unlimited number of downstream landing pages, most of which remain uncaptured. It is important to note that TDSs can also be used to serve legitimate advertising content to users\u2014in fact, that industry is where the term \u201ctraffic distribution system\u201d originated. Unfortunately, TDSs enable threat actors to deliver malicious content to the desired users, while intentionally diverting automated traffic, including tools used by security researchers, into dead ends. This is done in conjunction with cloaking kits, which are often tightly coupled to TDSs, but are separate. Vane Viper hides behind the plausible deniability of operating as an advertising network, while using their TDS to deliver multiple kinds of threats. Adtech\u2019s fragmented structure and reliance on real-time bidding (RTB) makes plausible deniability inherent.<sup>8<\/sup>  Confiant\u2019s Zirconium malvertising actor is another good example of how threat actors exploit the fragmentation across adtech\u2019s demand and supply chains.<sup>9<\/sup>  With so many intermediaries across every step of the adtech supply chain, it\u2019s easy for malicious actors to pose as legitimate players.<\/p>\n<h3>Corporate Structure and History<\/h3>\n<p>The \u201ctangled web\u201d we refer to is the network of intricate relationships between companies owned by AdTech Holding, and those they do business with, such as their webhost and domain registrar. AdTech Holding sits at the top of an investor portfolio that includes PropellerAds and at least four other companies:<\/p>\n<ul class=\"list-spacing\">\n<li>ProPushMe<\/li>\n<li>Zeydoo<\/li>\n<li>Notix<\/li>\n<li>Adex<\/li>\n<\/ul>\n<p>Each of these companies play their own role in this adtech ecosystem, from managing push notifications to ostensibly identifying bot traffic. We have seen Notix, Adex, and ProPush domains alongside Vane Viper domains in many campaigns. Each of these companies can, and do, have their own subsidiaries. Monetag, another adtech company (but not a named part of AdTech Holdings), is a subsidiary of PropellerAds, as Figure 3 shows:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11744\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-3.jpg\" alt=\"Figure 3\" width=\"816\" height=\"676\" \/><\/p>\n<p class=\"image-caption\">Figure 3. A screenshot of promo.monetag[.]com\/page47501153.html, complete with PropellerAds branding and contact information<\/p>\n<p>Propeller\u2019s subsidiaries like Monetag attempt to obscure the link to their parent company. It was sheer luck to stumble across Figure 3; for a while we were operating under the assumption that Monetag was a separate, yet associated, firm. BeMob and RollerAds are good examples of what we mean by \u201cseparate but associated.\u201d PropellerAds holds strategic partnerships with both companies. BeMob has advertised their partnership with PropellerAds since 2017. Guardio recently published research on the use of the BeMob TDS as a sort of proxy (wherein the campaign operator chained BeMob TDS after Vane Viper\u2019s TDS, specifically Monetag) before delivering Lumma Stealer payloads.<sup>10<\/sup>  RollerAds was founded by a former manager at PropellerAds, and we currently believe it to be operating independently but would not be surprised if it is a subsidiary of PropellerAds.<\/p>\n<p>If you are confused by the commercial relationships already, hang tight\u2014it only gets more convoluted from here.<\/p>\n<p>PropellerAds\u2019 ownership history is complicated. It was founded as an independent company in London in 2011.<sup>11<\/sup>  One of the original directors of this first iteration of PropellerAds is Mardiros Haladjian. He appears in the Paradise Papers with a Cyprian address and as director of a Maltese company named Eldor Services.<sup>12<\/sup>  Malta is a known European gambling hub, which doesn\u2019t seem to connect well to malicious adtech companies, until you dig a little deeper into Haladjian. In 2015, he was listed as the Respondent in a World Intellectual Property Organization (WIPO) domain dispute with EvoPlay LLP over Vulkan online casino domains.<sup>13<\/sup>  Strangely, Haladjian now seems to be the owner of EvoPlay, taking over after a series of ownership transitions between Belizean (likely shell) corporations.<sup>14<\/sup>  A few years later, in 2018, he was yet again named in another dispute related to Vulkan lookalike domains.<sup>15<\/sup> This time, Haladjian was a co-respondent alongside Russian nationals who work at Global Domain Privacy Services Inc., also known as Pananames\/URL Solutions (we\u2019ll come back to them later). We know Haladjian is involved with online gambling in collaboration with Russian nationals, and he seems to favor the use of shell corporations in offshore tax havens (in the WIPO disputes, he is named as \u201cMardiros Haladjian, GGS Ltd. of Anguilla\u201d); he also isn\u2019t averse to serial cybersquatting. The decision in the 2018 WIPO suit found that the Vulkan lookalikes were registered in bad faith; the 2015 suit did not. Regardless of the potential violations of trademark law, these could very easily run afoul of gambling laws, especially in Russia, where gambling is almost entirely illegal.<\/p>\n<p>But, like an old saloon owner, why stop at just gambling when there are more quick bucks to be made? Haladjian is also a director of Hammy Media Ltd., which is a Cyprus-based company that operates the major adult website xHamster.<sup>16<\/sup>  Hammy\/xHamster have been in some hot water recently, with the state of Texas filing a lawsuit against them in 2024 for failure to properly enforce age verification.<sup>17<\/sup> Additionally, Hammy was hit with a piracy lawsuit back in 2011, which they were able to get dismissed.<sup>18<\/sup> Take note of the lawyer who represented Hammy in that case (and who represented Haladjian in his WIPO disputes): Valentin David Gurvits, of Boston Law Group PC. He\u2019ll come up again later, as he appears to be the go-to lawyer for PropellerAds\/AdTech Holding. Additionally, a Welt am Sonntag investigation in 2016 referenced that investigators have linked Haladjian to a German piracy ring; we were unable to verify that further.<sup>19<\/sup><\/p>\n<p>Whoever was bankrolling PropellerAds soon realized it probably wasn\u2019t a good look to have a person with such a high-risk profile as Haladjian running the show, so they disbanded PropellerAds UK in July of 2014. They did, however, like shell games and tax havens, so PropellerAds popped up a few months later in the Isle of Man.<sup>20<\/sup>  Not much is known about this \u201cbranch\u201d of PropellerAds because the Isle of Man masks corporate details and because a trust company handled the incorporation. The PropellerAds that we know best, PropellerAds Ltd. based in Cyprus, came about in March 2016 and now operates under AdTech Holding. The leadership at AdTech Holding and PropellerAds includes the following:<\/p>\n<ul class=\"list-spacing\">\n<li>Aleksandr Fedorov serves as PropellerAds\u2019 CEO and sits on the AdTech Holding board.<\/li>\n<li>Alex Vasekin is the CEO of AdTech Holding.<\/li>\n<li>Igor Limbakh appears as a company director for both PropellerAds and AdTech Holding, and holds directorships at Samoukale Enterprises (Adex), Itpub, Finplat Technologies, Fourup, and others.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11745\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-4.jpg\" alt=\"Figure 4\" width=\"889\" height=\"592\" \/><\/p>\n<p class=\"image-caption\">Figure 4. An overview of the timeline and evolution of Embria\/PropellerAds\/AdTech Holding<\/p>\n<h3>URL Solutions<\/h3>\n<p>AdTech Holding maintains suspicious ties to a web of related firms. Their preferred registrar is URL Solutions, also known as Pananames. These are the same folks named as a co-respondent with the original director of PropellerAds (Mardiros Haladjian), in one of the Vulkan cybersquatting domain disputes. As of April 1, 2025, URL Solutions ranked third-riskiest registrar via our reputation scoring algorithm (see Figure 4).<sup>21<\/sup> URL Solutions moved up from eighth-riskiest registrar in February 2025 to third in March 2025 (cue Curtis Mayfield\u2019s \u201cMove On Up\u201d\u2014the extended version, please).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11746\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-5.jpg\" alt=\"Figure 5\" width=\"1033\" height=\"258\" \/><\/p>\n<p class=\"image-caption\">Figure 5. The ten riskiest registrars in March 2025 via our reputation algorithm<\/p>\n<p>In their 2024 \u201cPhishing Landscape\u201d report, Interisle Consulting Group clocked URL Solutions as the third-highest registrar associated with bulk domain registration.<sup>22<\/sup>  Bulk domain registrations are often suspicious in nature. A high volume of domains registered in a brief period can indicate an intention to quickly use and dispose of them, which is behavior we commonly see in cybercrime. Per Interisle, the number of bulk registration sets and the number of domains in each set, are undercounted because their research was constrained to domains that had been specifically reported for phishing. Using their definition of bulk registration (at least ten domains through the same registrar with less than ten minutes between consecutive domain registrations), we specifically looked at URL Solutions\u2019 bulk registration events since January 1, 2023. Vane Viper accounts for nearly half of all bulk registration events made through <strong>URL Solutions<\/strong> since January 2023.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11747\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-6.jpg\" alt=\"Figure 6\" width=\"387\" height=\"658\" \/><\/p>\n<p class=\"image-caption\">Figure 6. Monthly proportion of Vane Viper in URL Solutions bulk registration events<\/p>\n<p>URL Solutions purports to be founded and operating in Panama. However, it is noteworthy that their privacy policy lists an address in Cyprus, just a seven-minute drive from PropellerAds\u2019 office.<\/p>\n<p>URL Solutions is owned by <strong>CloudOne Digital<\/strong>, which also owns <strong>Webzilla, Servers.com<\/strong>, and virtual private server (VPS) provider <strong>Fozzy<\/strong>. The CEO of both Fozzy and URL Solutions is <strong>Dmitry Filatov<\/strong>, whose LinkedIn lists him as \u201cHead of B2C\u201d at <strong>XBT Holdings<\/strong> until April 2023.<sup>23,24<\/sup> CloudOne\u2019s ASN, 35415, which is operated by <strong>Webzilla B.V.<\/strong>, reports that multiple \/24s are assigned to both PropellerAds and Fozzy, which further tightens the infrastructure overlap.<sup>25<\/sup><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11748\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-7.jpg\" alt=\"Figure 7\" width=\"1032\" height=\"421\" \/><\/p>\n<p class=\"image-caption\">Figure 7. A diagram of relationships between notable people and companies in the Vane Viper ecosystem<\/p>\n<h3>XBT Holdings<\/h3>\n<p>This infrastructure overlap isn\u2019t merely a technical convenience. At minimum, it provides ideal conditions for actors who benefit from ambiguity, such as malicious adtech, to operate without clear accountability. XBT Holdings, the former parent of Webzilla and the organization that acquired the domain name Servers.com in 2013, was founded by Aleksej\/Aleksey\/Alexey Gubarev.<sup>26,27<\/sup><\/p>\n<p>Gubarev (shown in Figure 7, and later in Figure 8) has been a staple on the Cyprus tech scene since 2002. Gubarev co-founded a health tech company named Palta in 2016. In 2019, according to a representative for Gubarev, Alex Frolov, the son of U.K.-sanctioned oligarch Aleksandr Frolov,<sup>28,29<\/sup> joined Palta as another co-founder. Corporate filings and press releases name Gubarev and Alex Frolov as Palta co-founders. Target Global, the venture capital firm Frolov Jr. also founded, confirmed that Frolov Sr. and another sanctioned oligarch, Alexander Abramov, were early limited partners.<sup>30,31<\/sup> Gubarev is on the board of directors and co-founded TechIsland, a tech incubator dedicated to accelerating Cyprus\u2019 tech industry.<sup>32<\/sup> TechIsland lists AdTech Holding (and Adsterra, another adtech company with ties to malvertising and malware propagation) as a member. AdTech Holding is owned by Embria, a holding company that has historically used Servers.com infrastructure (185.106.140.1\/24) for the hosting of their websites embria[.]com and embria[.]one. AdTech Holding\u2019s own blog from April 2024 credits \u201cthe vision of Alexey Gubarev\u201d in helping to launch the Limassol skate park, a project AdTech Holdings also took part in.<sup>33<\/sup> Some media outlets have alleged that Gubarev played a role in facilitating the presence of Russian information technology businessmen reportedly linked to sanctions evasion, claiming that Cyprus has become a base for extending Moscow\u2019s influence in the European Union.<sup>34,35<\/sup> At some point, these aren\u2019t innocent business coincidences, or simply a measure of the goodwill emanating from TechIsland. Gubarev\u2019s ties to sanctioned oligarchs, coupled with his incubator\u2019s embrace of adtech companies linked to malware and fraud, demonstrate a blurring of ethical lines for commercial gain.<\/p>\n<p>XBT Holdings is privately held, so ownership stakes are unavailable. What is apparent, however, is that this is another shell game. Since 2012, Cyprian corporate filings show that \u201cXBT\u2019s shareholders have included one entity that appears to have no internet presence at all, and four that are registered in Singapore or Cyprus.\u201d<sup>36<\/sup> Of those four, one lists Gubarev as its owner; the others provide little to no ownership information. The use of anonymous or offshore entities as shareholders is commonly considered a signal of an intention to evade accountability.<sup>37,38,39,40,41,42,43<\/sup><\/p>\n<p>PropellerAds utilizes XBT infrastructure, which has been cited as being used in major disinformation and fraud cases. The Russian propaganda network Doppelg\u00e4nger used Webzilla as a hosting provider and URL Solutions as a domain registrar.<sup>44,45<\/sup>  Court filings in the Methbot ad fraud trial confirmed that a \u201csizable number\u201d of Methbot servers resided on XBT networks.<sup>46<\/sup>  Methbot used a large botnet to artificially inflate the views of video ads, garnering millions of advertising dollars. Servers.com CTO, and Webzilla CTO from 2005 to 2014, Kostyantyn\/Konstantin Bezruchenko testified that there were personal ties between the Methbot leader Aleksandr Zhukov and XBT founder Aleksej Gubarev.<sup>47<\/sup><\/p>\n<p>Gubarev first entered the geopolitical spotlight in 2017 when BuzzFeed posted the full, unverified Steele dossier. The dossier asserted that XBT\/Webzilla servers helped to transmit malware and steal data from the Democratic National Committee via \u201cbotnets and porn traffic.\u201d<sup>48<\/sup>  Gubarev sued BuzzFeed for defamation, and the case was dismissed; BuzzFeed later removed Gubarev\u2019s name and apologized, so Gubarev\u2019s appeal was withdrawn in 2021. During the proceedings, former FBI Cyber Chief Anthony Ferrante submitted a report that linked Webzilla address space to spear-phishing infrastructure. Ferrante\u2019s report, \u201cExhibit 1,\u201d reviews Bezruchenko\u2019s deposition and details a striking lack of visibility into Webzilla\u2019s network. Ferrante argued that \u201c[XBT does] not actively prevent the use of their infrastructure to support malicious cyber activity.\u201d<sup>49<\/sup>  Ferrante also cited Bezruchenko\u2019s deposition when he opined that Webzilla had inadequate takedown procedures. Hypothetically, webhosts without robust abuse processes often become attractive to persistent malvertising actors. A rebuttal expert report filed by Dr. Eric B. Cole on XBT\u2019s behalf challenges Ferrante\u2019s findings, calling the analysis \u201cmisleading\u201d and noting the investigation \u201chas no information based on collection and analysis from XBT Holding systems.\u201d<sup>50<\/sup> Cole argues that traffic like the packets Ferrant flags \u201cpasses across IPs in every AS across the world\u201d and that the record contains \u201cno forensic evidence\u201d tying XBT or Webzilla to deliberate wrongdoing; no court has found XBT or its affiliates liable.<\/p>\n<h3>Webzilla<\/h3>\n<p>Kostyantyn\/Konstantin Bezruchenko owns the U.S. corporate shell of Webzilla (Figure 7, above). WHOIS filings also attach his name to the registration of xbt[.]com, and he\u2019s listed as the contact person for URL Solutions.<sup>51,52<\/sup> He incorporated Webzilla Inc. using Incorporate Now, a mailbox service run by long-time associate Constantin Luchian.<sup>53<\/sup> Reporting by McClatchy found \u201cthat Nikita V. Kuzmin, the creator of the Gozi virus, which stole online banking data, incorporated at least three companies in South Florida, with the administrative assistance of Webzilla officer Constantin Luchian.\u201d<sup>54<\/sup> Additional reporting brought to light the fact that the International Intellectual Property Association entered a formal complaint that Webzilla \u201cserviced and administered\u201d a Cyprus company called 4shared[.]com. At the time, the complaint said that 4shared was the most-cited piracy website in the world. Webzilla denied liability but kept the customer.<sup>55<\/sup><\/p>\n<p>Webzilla\u2019s decision to maintain business with an alleged piracy website, even after being implicated in a formal complaint, highlights how willing the company is to embrace high-risk clients. In addition to using Webzilla for hosting, 4shared[.]com uses URL Solutions as its registrar.<sup>56<\/sup> Luchian and another Bezruchenko associate, Konstantin Bolotin, appear in multiple lawsuits. At one point, they were sued in federal court by Hydentra HLP over an adult-traffic affiliate scheme that used Webzilla infrastructure.<sup>57<\/sup><\/p>\n<p>One of the suit\u2019s domains (sunsocialmedia[.]com), still resolves today to Webzilla\u2019s AS 40824 block at 199[.]101[.]134[.]0\/24.<sup>58<\/sup> Further, the domain\u2019s A record has a pointer (PTR) record of servicedomain[.]net. The WHOIS registrant email of that PTR record domain is info@lightsoft[.]co; the owner of Lightsoft is Konstantin Bolotin.<sup>59<\/sup> Earlier German court filings on Freakshare (alleged to be a member of a global criminal enterprise run by two German citizens) list Luchian as the Digital Millennium Copyright Act agent via Scottish shell Vollend Plus LP, itself owned by two Seychelles entities.<sup>60<\/sup> The involvement of the same small set of actors (Luchian, Bolotin, and Bezruchenko) in lawsuits that span adult content, piracy, and malware paints a picture of a close-knit, well-orchestrated team employing deliberate strategies.<\/p>\n<h3>Lawfare<\/h3>\n<p>Let\u2019s return to Valentin Gurvits, the lawyer who represented Mardiros Haladjian (Figure 7), one of the initial directors of PropellerAds, in his various legal escapades. He is also counsel for Aleksei Gubarev\/XBT. Gurvits commented to media outlets on the Methbot case and essentially played the plausible deniability card, admitting that bad actors had \u201cmisused\u201d Webzilla infrastructure, and that Webzilla was not at fault for such misuse.<sup>61<\/sup> Then, he led the 2017 defamation case against BuzzFeed over the Steele dossier. He has defended Constantin Luchian and Konstantin Bolotin in the Hydentra lawsuit and helped Luchian file the U.S. copyright paperwork for Vollend Plus. In nearly every civil case touching PropellerAds, XBT\/Webzilla, or their various offshore fronts, Gurvits has acted as counsel to a web of malvertising, gambling, piracy, ad fraud, and adult content operations.<\/p>\n<h3>Corporate Connections<\/h3>\n<p>Let\u2019s recap: PropellerAds\u2019 lineage is one of shell-games: \u201cfounded\u201d in London, moved to the Isle of Man, then reborn in Cyprus under AdTech Holding. Its original director, Mardiros Haladjian, shows up in the Paradise Papers, WIPO cybersquatting disputes, and in lawsuits against his adult content company Hammy Media. PropellerAds\u2019 Cyprus office lies seven minutes from URL Solutions\u2019 contact address and Vane Viper domains make up nearly 50 percent of bulk-registered domains via URL Solutions since 2023. R\u00e9seaux IP Europ\u00e9ens (RIPE) maps multiple \/24 blocks owned by PropellerAds on Webzilla\/XBT address space. AdTech Holding is ensconced in Alexei Gubarev\u2019s TechIsland incubator and AdTech Holding\u2019s founders at Embria use Servers.com for hosting infrastructure. XBT\u2019s networks have hosted the Methbot ad fraud botnet, the Kremlin\u2019s Doppelg\u00e4nger disinformation campaign, and piracy giants like 4shared. Valentin Gurvits, the go-to lawyer for Haladjian, Gubarev, Bezruchenko, Luchian, and Bolotin, represents them in court. None of these links proves coordinated wrongdoing. However, in aggregate, they paint a picture of opaque shareholding, offshore companies in tax havens, and networks repeatedly flagged for malvertising, disinformation, click-fraud, privacy, and ad traffic abuse. When those sketchy business practices intersect with the documented threats below, any claim of plausible deniability loses credibility.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11752\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-8.jpg\" alt=\"Figure 8\" width=\"982\" height=\"539\" \/><\/p>\n<p class=\"image-caption\">Figure 8. A brief recap of key players in the Vane Viper ecosystem and their role<\/p>\n<p>With \u201cplausible deniability\u201d hanging by a thread, let\u2019s now turn to the real-world tricks Vane Viper uses and the threats they deliver.<\/p>\n<h3>Push Comes to Shove<\/h3>\n<p><strong>Under the Hood<\/strong><\/p>\n<p>Pushy salespeople are everyone\u2019s \u201cfavorite,\u201d right? Whether on the street, in a supermarket, or door to door, they just won\u2019t take no for an answer. In-browser push notifications are similar. And there are legitimate use cases for them. They offer users an easy way to stay up to date with Facebook or Reddit posts, or with breaking news. But they also offer threat actors an opportunity to achieve persistence on an endpoint and in a network.<\/p>\n<p>How do these notifications work under the hood? They rely on service workers: JavaScript files that act as a proxy service, intercepting network requests between the web app and the network. Vane Viper uses service workers and script chaining to abuse push notifications. In 2024, GoSecure published an in-depth analysis of a set of malicious service worker files but did not identify the operator at the time.<sup>62<\/sup> Correlating the domains in that report with our own data shows that these service workers belong to Vane Viper. A service worker\u2019s use of \u201ceval()\u201d to execute any content fetched from a remote URL is most alarming, as it lets any code retrieved from that URL run in the page\u2019s context. The remote URL queried is given by one of the hardcoded domains within the service worker.<\/p>\n<p>These push notifications, as mentioned, grant persistence on an endpoint if they\u2019re accepted by the user. Once accepted, the user\u2019s device turns into a merry-go-round of malvertising, enabling a constant stream of threats. In analyzing the lifespan of Vane Viper domains, most domains were active for less than a month; however, a certain set of domains have been active for 1,200 days or more. These include good old omnatuor[.]com, (which we published about in August 2022), propeller-tracking[.]com, and many domains that appear to be centered around push notification services: in-page-push[.]com, pushimg[.]com, inpagepush[.]com, propu[.]sh, and others.<sup>63<\/sup> However, to keep the operation going, Vane Viper needs to register vast numbers of new domains each month. Figure 9 shows the increasing monthly registration count of domains since January 2023, up to the maximum monthly count of 3,500 domains in October of 2024.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11753\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-9.jpg\" alt=\"Figure 9\" width=\"978\" height=\"394\" \/><\/p>\n<p class=\"image-caption\">Figure 9. The number of Vane Viper domains registered per month since January 2023<\/p>\n<p>By cycling through thousands of domains each month and keeping key push notification domains alive for years, Vane Viper demonstrates a strong resilience to takedowns and an increasing scale of operations.<\/p>\n<h3>The Funnel<\/h3>\n<p>Vane Viper uses their TDS to deliver threats in a variety of ways: from push notifications sent to an endpoint, to compromised or lookalike sites that victims can stumble across while web browsing. For example, in our research, we came across a malware trojan that was dropped onto a Pixel phone from a Vane Viper domain in the form of a malicious APK file (Figure 10).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11754\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-10.jpg\" alt=\"Figure 10\" width=\"977\" height=\"389\" \/><\/p>\n<p class=\"image-caption\">Figure 10. The VirusTotal entry for a malicious APK dropped onto a burner phone from a Vane Viper domain during our research (Credit: VirusTotal)<\/p>\n<p>The trojan was Triada, and it was dropped from the domain visionedmisfocusedpanfry[.]com.<sup>64<\/sup> But when we tried to visit the domain in URLScan, it showed up as a wrapper for a Google search, as shown in Figure 11. That\u2019s part of the power of a TDS: if you don&#8217;t match the \u201cdesired victim\u201d profile, it can be hard to tell anything is amiss about the domain.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11755\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-11.png\" alt=\"Figure 11\" width=\"970\" height=\"444\" \/><\/p>\n<p class=\"image-caption\">Figure 11. A search bar, which queries Google, on visionedmisfocusedpanfry[.]com (Credit: URLScan<sup>65<\/sup>)<\/p>\n<p>We\u2019ve also seen Vane Viper distribute malicious browser extensions, fake shopping sites, adult content, survey scams, fake apps, and sketchy software downloads. One operation, which ends in a likely fake software download (we were unable to obtain a sample but are confident in our assessment due to analysis of the various domains along the redirection chain, explained further below), starts with a bit[.]ly link, forces a push subscription gate, then drops users onto a supposed Opera Browser download page. We suspect that Vane Viper themselves, and not an affiliate, ran this campaign for the purposes of ad fraud. Figure 12 provides a domain tree (read bottom-up) illustrating one variation of the traffic flow from this campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11756\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-12.jpg\" alt=\"Figure 12\" width=\"895\" height=\"589\" \/><\/p>\n<p class=\"image-caption\">Figure 12. The domain tree for this campaign, read bottom-up (Credit: URLScan<sup>66<\/sup>)<\/p>\n<p>Apart from the initial bit[.]ly link, we assess that Vane Viper registered and controls each domain in the tree. All observed traffic flows between these domains and there are no third-party publisher or affiliate domains involved. Moreover, the domain landingpane[.]com (used as a sort of static-content CDN) is hosted on the IP address 188[.]42[.]160[.]55. Webzilla is the sponsoring upstream holder for that network space, but the entire IPv4 \/24 block 188[.]42[.]160[.]0\u2013188[.]42[.]160[.]255 has been assigned to PropellerAds. An overview of selected fields from the most recent WHOIS lookup is provided in Table 2 below.<\/p>\n<table>\n<thead>\n<tr>\n<th>WHOIS Field<\/th>\n<th>Value<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>inetnum<\/td>\n<td>188[.]42[.]160[.]0 \u2013to 188[.]42[.]160[.]255<\/td>\n<\/tr>\n<tr>\n<td>netname<\/td>\n<td>NET-188-42-160-0-24<\/td>\n<\/tr>\n<tr>\n<td>descr<\/td>\n<td>PROPELLER ADS LTD (Zinonos Rossidi 11, Limassol 3082, Cyprus)<\/td>\n<\/tr>\n<tr>\n<td>country<\/td>\n<td>NL<\/td>\n<\/tr>\n<tr>\n<td>status<\/td>\n<td>ASSIGNED PA<\/td>\n<\/tr>\n<tr>\n<td>created<\/td>\n<td>2022-12-09T13:36:47Z<\/td>\n<\/tr>\n<tr>\n<td>last-modified<\/td>\n<td>2024-04-22T06:39:19Z<\/td>\n<\/tr>\n<tr>\n<td>sponsoring LIR\/org-name<\/td>\n<td>Webzilla B.V. (ORG-WL21-RIPE; Keienbergweg 22, Amsterdam, NL)<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\">Table 2. RIPE WHOIS assignment record for 188[.]42[.]160[.]0\/24<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>This means that PropellerAds is the direct tenant of that address space and controls all routing, reverse\u2010DNS, and server deployments within it. landingpane[.]com has been linked to a VirusTotal file submission that has a \u201cBrowserknock\u201d trojan label.<sup>67<\/sup> We assess that this is a similar sample to the one that we found and analyzed because of the inclusion of a function called \u201cknock.\u201d<\/p>\n<p>In this instance, the user is prompted to accept push notifications before ever reaching the landing page. The push notification page, shown in Figure 9, presents itself as a video prompt but is actually a malvertising funnel.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11757\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-13.png\" alt=\"Figure 13\" width=\"983\" height=\"125\" \/><\/p>\n<p class=\"image-caption\">Figure 13. Page forcing the user to accept push notifications (Credit: URLScan<sup>68<\/sup>)<\/p>\n<p>Upon page load, the following sequence unfolds asynchronously:<\/p>\n<p><strong>Token Generation and Tracking<\/strong><\/p>\n<ul>\n<li>As soon as a user lands on the page, an \u201cOAID\u201d token is generated and sent off to my[.]rtmark[.]net to obtain a \u201cGID\u201d (likely a global identifier). This GID\/OAID value is then stamped to the victim\u2019s browser to enable fingerprinting. <\/li>\n<\/ul>\n<p><strong>Browser History Poisoning<\/strong><\/p>\n<ul>\n<li>Next, the page poisons the browser history and hijacks the back button, preventing users from leaving the page, in addition to prompting them with a confirmation (\u201cAre you sure you want to leave?\u201d) if they attempt to exit the page completely.<\/li>\n<\/ul>\n<p><strong>Notification Abuse<\/strong><\/p>\n<ul>\n<li>When the request for notification permission is denied, the script forces a random single-letter subdomain redirect to dodge permission refusals. In the background, an event listener is set up to listen on clicks, ensuring that even accidental clicks cause redirect activities. <\/li>\n<\/ul>\n<p><strong>Redirection<\/strong><\/p>\n<ul>\n<li>Regardless of whether the user accepts, denies, or ignores the notification prompt, the script ultimately redirects them to a dynamically chosen target page.<\/li>\n<\/ul>\n<p>After the push notification gate, the TDS command-and-control (C2) server returns a JSON file that guides further behavior of the redirects based on attributes including the primary URL for the next redirection, the user\u2019s unique IDs (oaid, ruid), and session timeouts. The evidence demonstrating that Vane Viper themselves run this campaign increased when we discovered that they included &#8220;partner&#8221;:&#8221;pa&#8221; in this JSON (we believe PA = PropellerAds). Geofences and time zone offsets ensure the campaign hits the right users at the right time. Other attributes control pop-under, interstitial, and anti-adblock behavior, giving a glimpse into how the TDS dynamically reacts to ad blockers. There are feature toggles as well, including things like \u201csmartOverlay,\u201d \u201cclickAnywhere,\u201d and \u201ciOSClickFix.\u201d Figure 14 shows the landing page for this campaign. The iOSClickFix feature toggle is especially interesting given the rise of \u201cClick Fix\u201d attacks in the last year or so; however, our conversations with other researchers indicate that this feature is likely unrelated to the commonly seen attack, which typically targets Windows. It is worth noting though, that MediaTrust previously published Click Fix research that shows overlap with Vane Viper behavior.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-11758\" src=\"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-figure-14.png\" alt=\"Figure 14\" width=\"918\" height=\"383\" \/><\/p>\n<p class=\"image-caption\">Figure 14. An Opera Browser \u201cdownload page\u201d used as a landing page for a Vane Viper campaign (Credit: URLScan<sup>69<\/sup>)<\/p>\n<p>The landing page masquerades as a download step, presenting cues (in this case in German) that translate to \u201calmost there.\u201d Every call to action links to ninoglostoay[.]com and uses long, encoded query strings. Inline scripts inject \u201cfake history states\u201d (i.e., adding history entries by appending the string variable \u201cfakepath\u201d to the page URL along with a random number) upon page load, user interaction on the page, and use of the \u201cback\u201d button. That is, every time a user clicks \u201cback\u201d in their browser, the fake history entries only grow longer. This technique of generating fake history states effectively traps users on the malicious site, funneling them to further harmful content.<sup>70<\/sup> A full-screen transparent &lt;a&gt; tag overlays the page, ensuring any user click redirects to a payload URL.<\/p>\n<p>Other media have linked Vane Viper domains to PropellerAds and malicious activity. Alongside GoSecure\u2019s research mentioned above, the Digital Citizens Alliance (DCA), a registered nonprofit in the United States focused on internet safety, has linked PropellerAds to malvertising on privacy websites. In their report titled \u201cUnholy Triangle,\u201d DCA claims that PropellerAds \u201cand its related domains (in-page-push[.]com and inpagepush[.]com) accounted for an estimated $31 million\u2014or one in four dollars\u2014of the malvertising found on piracy websites.\u201d<sup>71<\/sup> PropellerAds was also implicated in the early stages (Spring 2017) of the Master134 malvertising campaign, wherein their domain onclkds[.]com was used to redirect traffic to malicious sites.<sup>72<\/sup><\/p>\n<p>Recent research by GoDaddy shows that the Master134 operation evolved into a campaign now called \u201cDollyWay World Domination.\u201d<sup>73<\/sup> At the time, a PropellerAds representative wrote that \u201cit is impossible to know whether traffic is hijacked and it is virtually impossible to ascertain whether the traffic is being redirected to malicious websites.\u201d<sup>74<\/sup> The same pattern reemerged in October 2018 when an affiliate marketer (\u201cFMLTD\u201d) opened a thread titled \u201cPropellerAds Traffic Issue\u201d on AffiliateFix.<sup>75<\/sup> After the marketer documented that a hacked site was funneling visitors through PropellerAds\u2019 network, Propeller\u2019s support replied, \u201cNobody is hacking sites \u2026 Everything is legal,\u201d then stopped answering emails until the dispute became public and the thread was escalated. PropellerAds has also been implicated in acting as a TDS for Tag Barnakle, a malvertising actor who compromises ad servers.<sup>76,77<\/sup> In response, Propeller again shirked responsibility and went so far as to label Confiant\u2019s research \u201clibelous.\u201d<sup>78<\/sup> Ongoing complaints from marketers and security researchers alike about bot or illegal traffic from their domains seem to demonstrate a consistent reluctance by PropellerAds to accept responsibility.<\/p>\n<h3>Conclusion<\/h3>\n<p>Vane Viper\u2019s operation is built for scale and evasion and provides a mechanism for them and other bad actors to run malicious ad campaigns. Through nearly 60,000 known unique domains, most active for only days or weeks, they leverage push notification persistence, dynamic cloaking, and script chaining to deliver cyberthreats at scale. URL Solutions, Webzilla, and AdTech Holding form a closely connected trio of firms: domains registered en masse via a registrar steeped in cybercrime, hosted on infrastructure operated by a company that\u2019s hosted everything from Methbot to state-sponsored disinformation, and payloads delivered via an ad network long implicated in malvertising. <\/p>\n<p>This core has built out infrastructure that overlaps with warez hubs, piracy platforms, adult traffic brokers, disinformation campaigns, phishing, malware, and more; not to mention indirect financial and organizational connections to figures with serious reputational and legal baggage. Some linkages are circumstantial. But the persistence of these connections suggests a pattern, not a coincidence. Each company or character in the Vane Viper extended universe maintains just enough distance to deny intent yet remains tightly coupled enough to keep the system functioning.<\/p>\n<p>Vane Viper isn\u2019t just a threat actor hiding behind an adtech platform. It\u2019s a threat actor as an adtech platform. AdTech Holding claims to offer advertisers reach and monetization at scale, but what it actually delivers is risk. For enterprises, defenders, and internet users at large, that risk comes routed through CDN-grade infrastructure and delivered via click-to-accept. Vane Viper is a symptom of something deeper, however. The digital advertising ecosystem wasn\u2019t designed to be accountable to users. It was designed to be fast, scalable, and profitable. Somewhere along the way, that design became a liability. Vane Viper shows how easy it is to weaponize that ecosystem. In that sense, Vane Viper isn\u2019t just an example of the exploitability of the internet. Rather, they help reveal how much the internet has already been broken by an advertising model that prioritizes reach over responsibility and monetization over trust.<\/p>\n<p>Vane Viper domains from this research can be found in our <a href=\"https:\/\/github.com\/infobloxopen\/threat-intelligence\/blob\/main\/indicators\/csv\/vane_viper_20250912.csv\" target=\"_blank\">Github repository<\/a>.<\/p>\n<h3 style=\"font-size: 18px;\">References <\/h3>\n<ol style=\"font-size: 14px;\">\n<li><a href=\"https:\/\/blog.confiant.com\/tag-barnakle-the-malvertiser-that-hacks-revive-ad-servers-redirects-victims-to-malware-50cdc57435b1\" target=\"_blank\">https:\/\/blog.confiant.com\/tag-barnakle-the-malvertiser-that-hacks-revive-ad-servers-redirects-victims-to-malware-50cdc57435b1<\/a><\/li>\n<li><a href=\"https:\/\/blog.confiant.com\/tag-barnakle-one-year-later-120-more-revive-adserver-hacks-f3e5b3bc8e70\" target=\"_blank\">https:\/\/blog.confiant.com\/tag-barnakle-one-year-later-120-more-revive-adserver-hacks-f3e5b3bc8e70<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20241108151006\/https:\/\/www.techtarget.com\/searchsecurity\/news\/252486702\/Digital-ad-networks-tied-to-malvertising-threats-again\" target=\"_blank\">https:\/\/web.archive.org\/web\/20241108151006\/https:\/\/www.techtarget.com\/searchsecurity\/news\/252486702\/Digital-ad-networks-tied-to-malvertising-threats-again<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250125182941\/https:\/\/www.techtarget.com\/searchsecurity\/feature\/Inside-Master134-Propeller-Ads-connected-to-malvertising-campaign\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250125182941\/https:\/\/www.techtarget.com\/searchsecurity\/feature\/Inside-Master134-Propeller-Ads-connected-to-malvertising-campaign<\/a><\/li>\n<li><a href=\"https:\/\/www.digitalcitizensalliance.org\/clientuploads\/directory\/Reports\/Unholy-Triangle-Report.pdf\" target=\"_blank\">https:\/\/www.digitalcitizensalliance.org\/clientuploads\/directory\/Reports\/Unholy-Triangle-Report.pdf<\/a><\/li>\n<li><a href=\"https:\/\/support.google.com\/google-ads\/answer\/6320?hl=en&#038;ref_topic=24936&#038;sjid=10049883789707446307-NA\" target=\"_blank\">https:\/\/support.google.com\/google-ads\/answer\/6320?hl=en&#038;ref_topic=24936&#038;sjid=10049883789707446307-NA<\/a><\/li>\n<li><a href=\"https:\/\/support.google.com\/google-ads\/answer\/6365?hl=en\" target=\"_blank\">https:\/\/support.google.com\/google-ads\/answer\/6365?hl=en<\/a><\/li>\n<li><a href=\"https:\/\/advertising.amazon.com\/library\/guides\/real-time-bidding\" target=\"_blank\">https:\/\/advertising.amazon.com\/library\/guides\/real-time-bidding<\/a><\/li>\n<li><a href=\"https:\/\/blog.confiant.com\/uncovering-2017s-largest-malvertising-operation-b84cd38d6b85\" target=\"_blank\">https:\/\/blog.confiant.com\/uncovering-2017s-largest-malvertising-operation-b84cd38d6b85<\/a><\/li>\n<li><a href=\"https:\/\/labs.guard.io\/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6\" target=\"_blank\">https:\/\/labs.guard.io\/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6<\/a><\/li>\n<li><a href=\"https:\/\/opencorporates.com\/companies\/gb\/07675984\" target=\"_blank\">https:\/\/opencorporates.com\/companies\/gb\/07675984<\/a><\/li>\n<li><a href=\"https:\/\/offshoreleaks.icij.org\/nodes\/56063574\" target=\"_blank\">https:\/\/offshoreleaks.icij.org\/nodes\/56063574<\/a><\/li>\n<li><a href=\"https:\/\/www.wipo.int\/amc\/en\/domains\/decisions\/text\/2015\/d2015-0252.html\" target=\"_blank\">https:\/\/www.wipo.int\/amc\/en\/domains\/decisions\/text\/2015\/d2015-0252.html<\/a><\/li>\n<li><a href=\"https:\/\/opencorporates.com\/companies\/gb\/OC394908\" target=\"_blank\">https:\/\/opencorporates.com\/companies\/gb\/OC394908<\/a><\/li>\n<li><a href=\"https:\/\/www.wipo.int\/amc\/en\/domains\/decisions\/text\/2018\/d2018-0104.html\" target=\"_blank\">https:\/\/www.wipo.int\/amc\/en\/domains\/decisions\/text\/2018\/d2018-0104.html<\/a><\/li>\n<li><a href=\"https:\/\/www.dnb.com\/business-directory\/company-profiles.hammy_media_ltd.9ae0492162b3071b852c5adc8671b9de.html\" target=\"_blank\">https:\/\/www.dnb.com\/business-directory\/company-profiles.hammy_media_ltd.9ae0492162b3071b852c5adc8671b9de.html<\/a><\/li>\n<li><a href=\"https:\/\/www.texasattorneygeneral.gov\/sites\/default\/files\/images\/press\/Hammy%20Media%20Petition%20Filestamped.pdf\" target=\"_blank\">https:\/\/www.texasattorneygeneral.gov\/sites\/default\/files\/images\/press\/Hammy%20Media%20Petition%20Filestamped.pdf<\/a><\/li>\n<li><a href=\"https:\/\/www.pacermonitor.com\/public\/case\/601776\/Fraserside_IP_LLC_v_Hammy_Media_Ltd_et_al\" target=\"_blank\">https:\/\/www.pacermonitor.com\/public\/case\/601776\/Fraserside_IP_LLC_v_Hammy_Media_Ltd_et_al<\/a><\/li>\n<li><a href=\"https:\/\/www.welt.de\/print\/wams\/wirtschaft\/article157880510\/Geldmaschine-fuer-Fluechtende.html\" target=\"_blank\">https:\/\/www.welt.de\/print\/wams\/wirtschaft\/article157880510\/Geldmaschine-fuer-Fluechtende.html<\/a><\/li>\n<li><a href=\"https:\/\/opencorporates.com\/companies\/im\/011883V\" target=\"_blank\">https:\/\/opencorporates.com\/companies\/im\/011883V<\/a><\/li>\n<li><a href=\"https:\/\/insights.infoblox.com\/resources-research-report\/infoblox-research-report-reliable-reputation\" target=\"_blank\">https:\/\/insights.infoblox.com\/resources-research-report\/infoblox-research-report-reliable-reputation<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250611125113\/https:\/\/static1.squarespace.com\/static\/63dbf2b9075aa2535887e365\/t\/66cde404c8345e766972319c\/1724769286084\/PhishingLandscape2024.pdf\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250611125113\/https:\/\/static1.squarespace.com\/static\/63dbf2b9075aa2535887e365\/t\/66cde404c8345e766972319c\/1724769286084\/PhishingLandscape2024.pdf<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250318004226\/https:\/\/fozzy.com\/us\/about.shtml\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250318004226\/https:\/\/fozzy.com\/us\/about.shtml<\/a><\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/in\/dmitry-filatov-64867a46\/?originalSubdomain=cy\" target=\"_blank\">https:\/\/www.linkedin.com\/in\/dmitry-filatov-64867a46\/?originalSubdomain=cy<\/a><\/li>\n<li><a href=\"https:\/\/ipinfo.io\/AS35415\" target=\"_blank\">https:\/\/ipinfo.io\/AS35415<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250730193755\/https:\/\/www.prnewswire.com\/news-releases\/xbt-holding-ltd-continues-expansion-with-acquisitions-in-singapore-and-luxembourg-165397106.html\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250730193755\/https:\/\/www.prnewswire.com\/news-releases\/xbt-holding-ltd-continues-expansion-with-acquisitions-in-singapore-and-luxembourg-165397106.html<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250730194001\/https:\/\/finance.yahoo.com\/news\/xbt-3-holdings-acquisitions-050000400.html?guccounter=1\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250730194001\/https:\/\/finance.yahoo.com\/news\/xbt-3-holdings-acquisitions-050000400.html?guccounter=1<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250730194339\/https:\/\/siliconcanals.com\/palta-raises-84-2m\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250730194339\/https:\/\/siliconcanals.com\/palta-raises-84-2m\/<\/a><\/li>\n<li><a href=\"https:\/\/archive.is\/aYRY1#selection-445.157-445.166\" target=\"_blank\">https:\/\/archive.is\/aYRY1#selection-445.157-445.166<\/a><\/li>\n<li><a href=\"https:\/\/www.businessinsider.com\/alexander-frolov-leaves-target-global-after-father-is-sanctioned-2022-12\" target=\"_blank\">https:\/\/www.businessinsider.com\/alexander-frolov-leaves-target-global-after-father-is-sanctioned-2022-12<\/a><\/li>\n<li><a href=\"https:\/\/sifted.eu\/articles\/lawsuit-target-global-links-to-russia\" target=\"_blank\">https:\/\/sifted.eu\/articles\/lawsuit-target-global-links-to-russia<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250609121901\/https:\/\/thetechisland.org\/board-directors\/alexey-gubarev\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250609121901\/https:\/\/thetechisland.org\/board-directors\/alexey-gubarev<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250325224620\/https:\/\/adtechholding.com\/blog\/adtech-holding-limassol-city-skate-park\/\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250325224620\/https:\/\/adtechholding.com\/blog\/adtech-holding-limassol-city-skate-park\/<\/a><\/li>\n<li><a href=\"https:\/\/cynews.is\/gubarev-s-importation-putin-s-it-guys-take-over-cyprus\/\" target=\"_blank\">https:\/\/cynews.is\/gubarev-s-importation-putin-s-it-guys-take-over-cyprus\/<\/a><\/li>\n<li><a href=\"https:\/\/pressway.org.uk\/news\/300098-rucsian_it_businessman_gubarev_in_cyprus_how_a_tech_eeemigrantee_turned_the_island_into_a_hub_for_sanctions_evasion\" target=\"_blank\">https:\/\/pressway.org.uk\/news\/300098-rucsian_it_businessman_gubarev_in_cyprus_how_a_tech_eeemigrantee_turned_the_island_into_a_hub_for_sanctions_evasion<\/a><\/li>\n<li><a href=\"https:\/\/www.mcclatchydc.com\/news\/nation-world\/national\/article184786328.html\" target=\"_blank\">https:\/\/www.mcclatchydc.com\/news\/nation-world\/national\/article184786328.html<\/a><\/li>\n<li><a href=\"https:\/\/www.complif.com\/us\/blog\/unmasking-shell-companies-the-hidden-tools-of-financial-crime\" target=\"_blank\">https:\/\/www.complif.com\/us\/blog\/unmasking-shell-companies-the-hidden-tools-of-financial-crime<\/a><\/li>\n<li><a href=\"https:\/\/www.fincen.gov\/resources\/statutes-regulations\/guidance\/potential-money-laundering-risks-related-shell-companies\" target=\"_blank\">https:\/\/www.fincen.gov\/resources\/statutes-regulations\/guidance\/potential-money-laundering-risks-related-shell-companies<\/a><\/li>\n<li><a href=\"https:\/\/www.fraudconferencenews.com\/home\/2018\/6\/17\/breaking-the-shell\" target=\"_blank\">https:\/\/www.fraudconferencenews.com\/home\/2018\/6\/17\/breaking-the-shell<\/a><\/li>\n<li><a href=\"https:\/\/www.fbi.gov\/news\/speeches-and-testimony\/combating-illicit-financing-by-anonymous-shell-companies\" target=\"_blank\">https:\/\/www.fbi.gov\/news\/speeches-and-testimony\/combating-illicit-financing-by-anonymous-shell-companies<\/a><\/li>\n<li><a href=\"https:\/\/www.sanctions.io\/blog\/sanctions-evasion-through-shell-companies-explained\" target=\"_blank\">https:\/\/www.sanctions.io\/blog\/sanctions-evasion-through-shell-companies-explained<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20191214155442\/https:\/\/www.mcclatchydc.com\/news\/investigations\/article238024734.html\" target=\"_blank\">https:\/\/web.archive.org\/web\/20191214155442\/https:\/\/www.mcclatchydc.com\/news\/investigations\/article238024734.html<\/a><\/li>\n<li><a href=\"https:\/\/www.occrp.org\/en\/project\/the-troika-laundromat\" target=\"_blank\">https:\/\/www.occrp.org\/en\/project\/the-troika-laundromat<\/a><\/li>\n<li><a href=\"https:\/\/www.qurium.org\/alerts\/under-the-hood-of-a-doppelganger\/\" target=\"_blank\">https:\/\/www.qurium.org\/alerts\/under-the-hood-of-a-doppelganger\/<\/a><\/li>\n<li><a href=\"https:\/\/www.disinfo.eu\/wp-content\/uploads\/2022\/09\/Doppelganger-1.pdf\" target=\"_blank\">https:\/\/www.disinfo.eu\/wp-content\/uploads\/2022\/09\/Doppelganger-1.pdf<\/a><\/li>\n<li><a href=\"https:\/\/cdn.cnn.com\/cnn\/2019\/images\/03\/15\/xbt.doc.248.2.pdf\" target=\"_blank\">https:\/\/cdn.cnn.com\/cnn\/2019\/images\/03\/15\/xbt.doc.248.2.pdf<\/a><\/li>\n<li><a href=\"https:\/\/www.rferl.org\/a\/methbot-russia-internet-fraud-state-sponsored-hacking-zhukov\/31241417.html\" target=\"_blank\">https:\/\/www.rferl.org\/a\/methbot-russia-internet-fraud-state-sponsored-hacking-zhukov\/31241417.html<\/a><\/li>\n<li><a href=\"https:\/\/archive.org\/details\/TrumpIntelligenceAllegations_201801\" target=\"_blank\">https:\/\/archive.org\/details\/TrumpIntelligenceAllegations_201801<\/a><\/li>\n<li><a href=\"https:\/\/dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com\/external\/expertreportanthonyjferrante-1.pdf\" target=\"_blank\">https:\/\/dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com\/external\/expertreportanthonyjferrante-1.pdf<\/a><\/li>\n<li><a href=\"https:\/\/cdn.cnn.com\/cnn\/2019\/images\/03\/15\/show_temp_new.pdf\" target=\"_blank\">https:\/\/cdn.cnn.com\/cnn\/2019\/images\/03\/15\/show_temp_new.pdf<\/a><\/li>\n<li><a href=\"https:\/\/www.bigdomaindata.com\/whois-history\/xbt.com\" target=\"_blank\">https:\/\/www.bigdomaindata.com\/whois-history\/xbt.com<\/a><\/li>\n<li><a href=\"https:\/\/domains.mjwebs.com\/registrars\/url-solutions-inc-1449#:~:text=Konstantin%20Bezruchenko\" target=\"_blank\">https:\/\/domains.mjwebs.com\/registrars\/url-solutions-inc-1449#:~:text=Konstantin%20Bezruchenko<\/a><\/li>\n<li><a href=\"https:\/\/search.sunbiz.org\/Inquiry\/CorporationSearch\/SearchResultDetail?inquirytype=OfficerRegisteredAgentName&#038;directionType=Initial&#038;searchNameOrder=BEEBURTONZIII%20P090000643274&#038;aggregateId=domp-p09000064327-d6e3dc9a-5813-4545-ad87-f81cd784017a&#038;searchTerm=Beeble%20%20%20%20%20%20%20%20%20%20%20%20%20%20Kellie&#038;listNameOrder=BEEBLEKELLIEA%20L240001151610\" target=\"_blank\">https:\/\/search.sunbiz.org\/Inquiry\/CorporationSearch\/SearchResultDetail?inquirytype=OfficerRegisteredAgentName&#038;directionType=Initial&#038;searchNameOrder=BEEBURTONZIII%20P090000643274&#038;aggregateId=domp-p09000064327-d6e3dc9a-5813-4545-ad87-f81cd784017a&#038;searchTerm=Beeble%20%20%20%20%20%20%20%20%20%20%20%20%20%20Kellie&#038;listNameOrder=BEEBLEKELLIEA%20L240001151610<\/a><\/li>\n<li><a href=\"https:\/\/www.mcclatchydc.com\/latest-news\/article218740565.html\" target=\"_blank\">https:\/\/www.mcclatchydc.com\/latest-news\/article218740565.html<\/a><\/li>\n<li><a href=\"https:\/\/www.mcclatchydc.com\/news\/nation-world\/national\/article184786328.html\" target=\"_blank\">https:\/\/www.mcclatchydc.com\/news\/nation-world\/national\/article184786328.html<\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/0196a84a-7a09-72cc-a787-801cddaf8f02\/\" target=\"_blank\">https:\/\/urlscan.io\/result\/0196a84a-7a09-72cc-a787-801cddaf8f02\/<\/a><\/li>\n<li><a href=\"https:\/\/unicourt.com\/case\/rc-ap1-hydentra-hlp-int-limited-v-constantin-luchian-et-al-51105\" target=\"_blank\">https:\/\/unicourt.com\/case\/rc-ap1-hydentra-hlp-int-limited-v-constantin-luchian-et-al-51105<\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/e4ee74ff-25c2-485d-9c21-11ff630703c2\/#summary\" target=\"_blank\">https:\/\/urlscan.io\/result\/e4ee74ff-25c2-485d-9c21-11ff630703c2\/#summary<\/a><\/li>\n<li><a href=\"https:\/\/opencorporates.com\/companies\/us_fl\/P17000092716\" target=\"_blank\">https:\/\/opencorporates.com\/companies\/us_fl\/P17000092716<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20191214155442\/https:\/\/www.mcclatchydc.com\/news\/investigations\/article238024734.html\" target=\"_blank\">https:\/\/web.archive.org\/web\/20191214155442\/https:\/\/www.mcclatchydc.com\/news\/investigations\/article238024734.html<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250730205254\/https:\/\/www.rferl.org\/a\/methbot-russia-internet-fraud-state-sponsored-hacking-zhukov\/31241417.html\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250730205254\/https:\/\/www.rferl.org\/a\/methbot-russia-internet-fraud-state-sponsored-hacking-zhukov\/31241417.html<\/a><\/li>\n<li><a href=\"https:\/\/gosecure.ai\/wp-content\/uploads\/Anatomy-of-Service-Worker-Abuse-From-Visit-to-Network-Anomaly.pdf\" target=\"_blank\">https:\/\/gosecure.ai\/wp-content\/uploads\/Anatomy-of-Service-Worker-Abuse-From-Visit-to-Network-Anomaly.pdf<\/a><\/li>\n<li><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory\/vast-malvertising-network-hijacks-browser-settings-to-spread-riskware\/\" target=\"_blank\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory\/vast-malvertising-network-hijacks-browser-settings-to-spread-riskware\/<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/triada-trojan\/11481\/\" target=\"_blank\">https:\/\/www.kaspersky.com\/blog\/triada-trojan\/11481\/<\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/fb89ad59-72d7-4e05-9363-bcc6effe3f6b\/\" target=\"_blank\">https:\/\/urlscan.io\/result\/fb89ad59-72d7-4e05-9363-bcc6effe3f6b\/<\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/4ba9dd35-94d8-458e-864d-d2d97e92ef87\/#summary\" target=\"_blank\">https:\/\/urlscan.io\/result\/4ba9dd35-94d8-458e-864d-d2d97e92ef87\/#summary<\/a><\/li>\n<li><a href=\"https:\/\/www.virustotal.com\/gui\/file\/38891a56d25f66218be2aab15a90773919e8d91f0ed6b6b38637fba2b184c129\" target=\"_blank\">https:\/\/www.virustotal.com\/gui\/file\/38891a56d25f66218be2aab15a90773919e8d91f0ed6b6b38637fba2b184c129<\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/3eef35a8-8029-4eb4-823f-f32e36e81c57\/#summary\" target=\"_blank\">https:\/\/urlscan.io\/result\/3eef35a8-8029-4eb4-823f-f32e36e81c57\/#summary<\/a><\/li>\n<li><a href=\"https:\/\/urlscan.io\/result\/4ba9dd35-94d8-458e-864d-d2d97e92ef87\/#summary\" target=\"_blank\">https:\/\/urlscan.io\/result\/4ba9dd35-94d8-458e-864d-d2d97e92ef87\/#summary<\/a><\/li>\n<li><a href=\"https:\/\/blog.confiant.com\/malvertiser-d-shortiez-abuses-webkit-back-button-hijack-in-forced-redirect-campaign-6b57f91ee737\" target=\"_blank\">https:\/\/blog.confiant.com\/malvertiser-d-shortiez-abuses-webkit-back-button-hijack-in-forced-redirect-campaign-6b57f91ee737<\/a><\/li>\n<li><a href=\"https:\/\/www.digitalcitizensalliance.org\/clientuploads\/directory\/Reports\/Unholy-Triangle-Report.pdf\" target=\"_blank\">https:\/\/www.digitalcitizensalliance.org\/clientuploads\/directory\/Reports\/Unholy-Triangle-Report.pdf<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20250125182941\/https:\/\/www.techtarget.com\/searchsecurity\/feature\/Inside-Master134-Propeller-Ads-connected-to-malvertising-campaign\" target=\"_blank\">https:\/\/web.archive.org\/web\/20250125182941\/https:\/\/www.techtarget.com\/searchsecurity\/feature\/Inside-Master134-Propeller-Ads-connected-to-malvertising-campaign<\/a><\/li>\n<li><a href=\"https:\/\/www.godaddy.com\/resources\/news\/dollyway-malware-history\" target=\"_blank\">https:\/\/www.godaddy.com\/resources\/news\/dollyway-malware-history<\/a><\/li>\n<li>Wright, Inside &#8216;Master 134&#8217;<\/li>\n<li><a href=\"https:\/\/www.affiliatefix.com\/threads\/resolved-propellerads-traffic-issue.157288\/\" target=\"_blank\">https:\/\/www.affiliatefix.com\/threads\/resolved-propellerads-traffic-issue.157288\/<\/a><\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20241108151006\/https:\/\/www.techtarget.com\/searchsecurity\/news\/252486702\/Digital-ad-networks-tied-to-malvertising-threats-again\" target=\"_blank\">https:\/\/web.archive.org\/web\/20241108151006\/https:\/\/www.techtarget.com\/searchsecurity\/news\/252486702\/Digital-ad-networks-tied-to-malvertising-threats-again<\/a><\/li>\n<li><a href=\"https:\/\/blog.confiant.com\/tag-barnakle-one-year-later-120-more-revive-adserver-hacks-f3e5b3bc8e70\" target=\"_blank\">https:\/\/blog.confiant.com\/tag-barnakle-one-year-later-120-more-revive-adserver-hacks-f3e5b3bc8e70<\/a><\/li>\n<li><a href=\"https:\/\/propellerads.com\/pr-general-response-to-articles-alleging-malware-on-the-propeller-ads-network\/\" target=\"_blank\">https:\/\/propellerads.com\/pr-general-response-to-articles-alleging-malware-on-the-propeller-ads-network\/<\/a><\/li>\n<\/ol>\n<style>\n.savy-seahorse-table {font-size:14px;word-break: keep-all;}.savy-seahorse-table td:last-child, .savy-seahorse-table th:last-child {padding-right:10px;}.code-format {\tfont-family: 'Courier New';}.image-caption {    font-size: 12px;margin-top:auto;}.list-spacing li{margin-bottom:20px}.img-container, .img-container-3-col {display: flex;}.img-container img {    width: 40%;    margin-bottom: 10px;    height: max-content !important;}.img-container-3-col img {width: 30%;margin-bottom: 10px;}@media (max-width: 767px) {.img-container, .img-container-3-col {display: block;}.img-container img, .img-container-3-col img {width: 100%;}.grid-container {    grid-template-columns: 1fr!important;  }}@media (min-width: 767px) {.img-50{width:50%;}}.grid-container {  display: grid;  grid-template-columns: repeat(2, 1fr);  gap: 40px;  max-width: 800px;  margin: 0 auto;  align-items: stretch;}.grid-item {   display: flex;  flex-direction: column;  justify-content: flex-start;}.grid-item img {  width: 100%;  height: auto;}<\/style>\n<p><script>\njQuery('.single h1').html('Deniability by Design: <span class=\"gradient\">DNS-Driven Insights into a Malicious Ad Network<\/span>');\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary One typically imagines the digital underworld\u2014trojans, malware droppers, fake dating sites, investment scams, and more\u2014as operating in the dark corners of the internet. But increasingly, these threats are hiding in plain sight, camouflaged by the glossy veneer of mainstream digital advertising. In some cases, the adtech platforms are abused, but we have uncovered [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":12220,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[254],"tags":[30,902,1082,1147,774,1298,1299,1300,1301,1302,1303,1304,1305],"class_list":{"0":"post-12219","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threat-intelligence","8":"tag-dns","9":"tag-tds","10":"tag-traffic-distribution-system","11":"tag-adtech","12":"tag-malvertising","13":"tag-malicious-adtech-ecosystem","14":"tag-detecting-malicious-adtech-via-dns-indicators","15":"tag-dns-based-mitigations-for-malvertising-risk","16":"tag-malicious-adtech-domains","17":"tag-propeller-ads","18":"tag-adtech-holding","19":"tag-webzilla","20":"tag-url-solutions","21":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware<\/title>\n<meta name=\"description\" content=\"DNS analysis links Vane Viper&#039;s AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware\" \/>\n<meta property=\"og:description\" content=\"DNS analysis links Vane Viper&#039;s AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-16T12:55:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-25T15:24:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"936\" \/>\n\t<meta property=\"og:image:height\" content=\"936\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware\" \/>\n<meta name=\"twitter:description\" content=\"DNS analysis links Vane Viper&#039;s AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"31 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Deniability by Design: DNS-Driven Insights into a Malicious Ad Network\",\"datePublished\":\"2025-09-16T12:55:12+00:00\",\"dateModified\":\"2025-09-25T15:24:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/\"},\"wordCount\":6832,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\",\"keywords\":[\"DNS\",\"TDS\",\"Traffic Distribution System\",\"Adtech\",\"malvertising\",\"malicious adtech ecosystem\",\"detecting malicious adtech via DNS indicators\",\"DNS-based mitigations for malvertising risk\",\"malicious adtech domains\",\"propeller ads\",\"adtech holding\",\"webzilla\",\"url solutions\"],\"articleSection\":[\"Infoblox Threat Intel\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/\",\"name\":\"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\",\"datePublished\":\"2025-09-16T12:55:12+00:00\",\"dateModified\":\"2025-09-25T15:24:59+00:00\",\"description\":\"DNS analysis links Vane Viper's AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg\",\"width\":936,\"height\":936},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Deniability by Design: DNS-Driven Insights into a Malicious Ad Network\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware","description":"DNS analysis links Vane Viper's AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/","og_locale":"en_US","og_type":"article","og_title":"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware","og_description":"DNS analysis links Vane Viper's AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/","og_site_name":"Infoblox Blog","article_published_time":"2025-09-16T12:55:12+00:00","article_modified_time":"2025-09-25T15:24:59+00:00","og_image":[{"width":936,"height":936,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_title":"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware","twitter_description":"DNS analysis links Vane Viper's AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.","twitter_image":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"31 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Deniability by Design: DNS-Driven Insights into a Malicious Ad Network","datePublished":"2025-09-16T12:55:12+00:00","dateModified":"2025-09-25T15:24:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/"},"wordCount":6832,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg","keywords":["DNS","TDS","Traffic Distribution System","Adtech","malvertising","malicious adtech ecosystem","detecting malicious adtech via DNS indicators","DNS-based mitigations for malvertising risk","malicious adtech domains","propeller ads","adtech holding","webzilla","url solutions"],"articleSection":["Infoblox Threat Intel"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/","name":"Vane Viper: Russia\u2013Cyprus AdTech Nexus Delivering Malware","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg","datePublished":"2025-09-16T12:55:12+00:00","dateModified":"2025-09-25T15:24:59+00:00","description":"DNS analysis links Vane Viper's AdTech abuse to AdTech Holding and PropellerAds, delivering malware through fake software, APKs, and redirects.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network-thumbnail.jpg","width":936,"height":936},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/deniability-by-design-dns-driven-insights-into-a-malicious-ad-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Deniability by Design: DNS-Driven Insights into a Malicious Ad Network"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=12219"}],"version-history":[{"count":25,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12219\/revisions"}],"predecessor-version":[{"id":12326,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/12219\/revisions\/12326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/12220"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=12219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=12219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=12219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}