Your favorite websites might be secretly redirecting you to malware, and ad companies are helping them do it
Push notifications are now being used as malware delivery systems, and users are unknowingly subscribing to them Fake CAPTCHA prompts
June 19, 2025 WOL



Recent investigations have revealed a troubling alliance between WordPress hackers and commercial adtech companies, creating a vast infrastructure for distributing malware on a global scale.

Research from Infoblox Threat Intel found at the core of this operation is VexTrio, a traffic distribution system (TDS) responsible for rerouting web users through layers of fake ads, deceptive redirects, and fraudulent push notifications.

The report claims several commercial firms, including Los Pollos, Partners House, and RichAds, are entangled in this network, serving as both intermediaries and enablers.

Infoblox initially tied Los Pollos to VexTrio when the former was implicated in Russian disinformation campaigns.

In response, Los Pollos claimed it would terminate its “push link monetization” model.

Despite this, the underlying malicious activity continued as attackers shifted to a new TDS known as Help, which was eventually linked back to VexTrio.

WordPress vulnerabilities served as the entry point for multiple malware campaigns, as attackers compromised thousands of websites, embedding malicious redirection scripts. These scripts relied on DNS TXT records as a command-and-control mechanism, determining where to send web visitors.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

Analysis of over 4.5 million DNS responses between August and December 2024 revealed that even though various malware strains appeared separate, they shared infrastructure, hosting, and behavioral patterns that all led to VexTrio or its proxies, including Help TDS and Disposable TDS.

JavaScript across these platforms exhibited the same functions, disabling browser navigation controls, forcing redirects, and luring users with fake sweepstakes.

Interestingly, these TDSs are embedded within commercial adtech platforms that present themselves as legitimate affiliate networks.

“These firms maintained exclusive relationships with ‘publisher affiliates,’ in this context, the hackers, and knew their identities,” researchers noted.

Push notifications have emerged as a particularly potent threat vector. Users are tricked into turning on browser notifications by using fake CAPTCHA prompts.

Hackers then send phishing or malware links after a user subscribes, evading firewall settings and even the best antivirus programs.

Some campaigns route these messages through reliable services like Google Firebase, making detection significantly more difficult.

The overlap between adtech platforms, including BroPush, RichAds, and Partners House, further complicates attribution.

Misconfigured DNS systems and reused scripts suggest a common backend, possibly even a shared development environment.

To tackle the risk, users should avoid turning on suspicious browser alerts, use tools that offer zero-trust network access (ZTNA), and be cautious when using CAPTCHA prompts.

By updating WordPress and monitoring for DNS anomalies, site administrators can reduce the likelihood of compromise.

Adtech companies, however, might have the actual lever and the key to closing these operations if they choose to act.



Source link

https://wol.com/your-favorite-websites-might-be-secretly-redirecting-you-to-malware-and-ad-companies-are-helping-them-do-it/
Emirates for everyone

What's your reaction?


You may also like

Comments

https://www.iheartemirates.com/assets/images/user-avatar-s.jpg

0 comment

Write the first comment for this!

Facebook Conversations