What is client-side injection malware and how does it work? Are there any additional security controls enterprises...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
should put in place to mitigate such a threat?
Client-side injection malware is another variant of adware, potentially unwanted programs, spyware and other similar types of malicious code. CSIM requires unauthorized code to be installed on the endpoint to manipulate the ads displayed in a user's browser. The code could be a browser extension, an app that monitors for e-commerce discounts or "deals," or even something that changes network settings on an endpoint to alter what ads are displayed on the endpoint's browsers.
In a recent study, security vendor Namogoo outlined how there are millions of dollars to be made by manipulating what ads are displayed on an endpoint and hijacking a website's e-commerce traffic. CSIM authors can profit from displaying certain ads or from preventing certain ads from being displayed on an endpoint. For example, an ad displayed on a webpage could be changed from the intended ad to an ad from a competitor.
The same controls for preventing malware on an endpoint work for client-side injection malware, with the caveat that some companies that provide adware as well as coupon, deal or price notification apps operate on the border of legitimacy and might start changing how ads are viewed on an endpoint. As a result, additional vetting might be necessary to evaluate the risk of a particular app or program from such companies, as well as the risk of it including rogue functionality.
Learn more about the malvertising attacks on Yahoo ads
Dig Deeper on Web browser security
Related Q&A from Nick Lewis
A revamped Poison Ivy RAT campaign has been using new evasion and distribution techniques. Expert Nick Lewis explains the new attack methods that ...continue reading
Fileless malware hidden in server memory led to attacks on many companies worldwide. Expert Nick Lewis explains how these attacks fit in with the ...continue reading
Vulnerabilities in Java and Python have opened them up to possible FTP injections. Expert Nick Lewis explains how enterprises can mitigate these ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.