Hijacked devices used for click fraud could become a gateway to more advanced malware, according to the latest State of Infections Report from Damballa.
Further, the findings show how important it is to uncover malicious activity as quickly as possible to make infection less likely.
RuthlessTreeMafia, malware used in click fraud, has been found on botnet devices, generating fake ad clicks and costing advertisers thousands of pounds or more in the process.
When a botnet is creating the device, RuthlessTreeMafia operators could make money from other cyber criminals by allowing them to access the device for profit. They used downloaders in delivering the Trojans, earning yet greater profits for the hackers.
With click-fraud activity underway, CrytoWall ransomware infected the device, encrypting host system files, making it unavailable for the user. The cyber criminal then controls the device.
Damballa CTO Stephen Newman commented:
“The changing nature of these attacks underscores the importance of being armed with advanced detection, to combat these more stealthy threats.
“As infections can spread quickly through the network, security teams should take proactive measures to avoid becoming a cautionary click-fraud tale.”
Malware is one of the most common and severe forms of virus and can be especially dangerous within companies. Cyber criminals gaining access to company records, especially customer data, is unacceptable and can ruin a firm’s reputation. The best way to prevent such an occurrence is to fill cyber security jobs with those trained in dealing with these issues.
Send us your CV and have our recruiters match you to the ideal opportunities
Do you already have an account with us?
Log inWant to have an account with us?
RegisterWant to just send us your CV?
By submitting your registration and CV to us you are agreeing to join our database and to be contacted about relevant jobs industry communications. Please read our terms of business for more information.