04/23/2025 | News release | Distributed by Public on 04/23/2025 09:22
The Verizon 2025 DBIR provides multiple insights on how adversaries have increased the scale of their operations and succeeded in finding new targets. According to Dr. Renée Burton, head of Infoblox Threat Intel, many of the Verizon findings highlight the under-recognized threat of traffic distribution systems (TDS) and malicious adtech. Infostealers, ransomware or advanced phishing are no longer isolated threats-they're leveraging the adtech ecosystem to hide and advance their operations. To disrupt one, you must understand how modern threats are being delivered to evade detections. Let's look at major observations and how malicious adtech enables this.
"Infostealers, ransomware or advanced phishing are no longer isolated threats-they're leveraging the adtech ecosystem to hide and advance their operations."
This year, the Verizon DBIR represented the highest number of breaches ever analyzed in a single report, providing insights like a 37 percent increase in ransomware and infostealer problems. Other threat research reports also highlighted how information stealers themselves are propagated through the use of malicious TDSs, including the annual report by GoDaddy which analyzed over 1 million compromised websites. Despite these numbers, threat actor use of adtech to fuel their operations remains under-reported. Threat actors abuse legitimate adtech companies and affiliate with malicious adtech companies to create an ecosystem in which the true nature of their activity is well hidden.
At the heart of malicious adtech are TDSs used to deliver infostealers, advanced phishing tools or malicious advertisements while remaining undetected. In 2024, Infoblox discovered several actors, one of them named Vane Viper, who delivers highly popular LummaStealer malware hidden behind a fake CAPTCHA. Another actor named Vacant Viper, who hijacks domain names for their homegrown 404TDS, is known to deliver numerous remote access trojans (RATs).
During in-depth research earlier this year, Infoblox reported that visiting a website linked with malicious adtech can have a long-lasting impact on the user's experience with their device. Through adtech integration, malicious adtech trick users into website notifications, often called push notifications. Once the victim accepts notifications, deceptive messages or prompt bombing, such as fake virus alerts, will pop onto the screen. Clicking on those pop-ups will lead to more malicious content, which in turn negatively influences the user's experience with legitimate websites and newsfeeds.
Protective DNS is a critical mechanism to identify and track these threat actors. While there is growing awareness of the role of adtech, specifically usage of TDS in the attack chain, the domains used by these actors remain largely undetected by most major security vendors. By using protective DNS solutions, enterprises of all sizes and individuals can be safeguarded from all manner of threats in a cost-effective way. Over the past years, Infoblox blocked over 75 percent of all threat domains prior to the very first DNS query from our customers, with success rates exceeding 90 percent in most individual customer networks.
To learn more about malicious adtech