Assessment: We’ve started tracking a signature that looks to be attempting to do video stuffing.
Additional Details: Currently, only a handful of publishers have been impacted, but we're continuing to monitor this campaign.
Assessment: We’ve started tracking a signature that looks to be attempting to do video stuffing.
Additional Details: Currently, only a handful of publishers have been impacted, but we're continuing to monitor this campaign.
Assessment: Ongoing malicious activity leveraging websockets - to fingerprint a user’s browser and load additional known malicious domains - attached to legit creative scripts. Affected platforms: Sizmek and AOL/AdTech
Additional Details: To date, over 1M ads have been impacted and blocked across Ad Lightning’s partners
Assessment: Small uptick in redirect activity originating from the Avazu platform targeting iOS users on iPhone and iPad Safari.
Additional Details: Signature has been identified and blocked across 30+% of Ad Lightning's clients.
Assessment: Two additional active threats have been identified and blocked.
Additional Details: To date, 1M ads have been impacted across Ad Lightning's partners.
Assessment: Emerging redirect campaign detected and blocked. The ads are loading a malicious cloudfront script that subsequently loads fingerprinting logic to determine if the user is on a mobile device, and will perform a redirect if it's an iPhone. If not, it's loading the hijacked ad campaign below.
Additional Details: Campaign has been targeted to US residents only. Primarily one SSP appears to be impacted. Originating DSP is PocketMath.