Google's push to encrypt ads will improve security, but won't kill malvertising

The move might encourage more websites to deploy HTTPS

Google plans to serve most of its ads over encrypted HTTPS connections by the end of June, a move that will protect against some ad hijacking attacks and will encourage website owners to enable encryption on their Web properties.

However, malicious advertising attacks that direct users to Web-based exploits will still be possible and, because of the new encryption, it will be harder for security researchers to pinpoint their source.

Last year, Google announced that it will give more weight to HTTPS-enabled websites in search rankings in order to encourage the adoption of encryption across the Web. HTTPS (HTTP Secure) allows Web communication over a channel encrypted with the TLS (Transport Layer Security) protocol.

One of its main benefits is that it prevents the traffic from being read or modified by someone in a position to intercept it -- hackers in control of a router or prowling inside an insecure wireless network, rogue ISP employees, or a government agency spying on the Internet backbone.

A big problem webmasters have with implementing HTTPS is not the cost of buying digital certificates, but the fact that their websites load resources -- primarily advertisements -- from third parties that don't serve them over HTTPS. Loading non-encrypted resources into HTTPS websites will lead to mixed content warnings in browsers and cancels the security benefits of enabling HTTPS in the first place.

In this context, Google's efforts to start encrypting ad traffic will make transitioning to HTTPS easier for many websites, therefore increasing overall privacy and security on the Web.

By June 30 of this year, Google will encrypt "the vast majority" of mobile, video, and desktop display ads served to the Google Display Network, AdMob, and DoubleClick publishers, the company said Friday in a blog post. By this date, advertisers using any of Google's buying platforms, including AdWords and DoubleClick, will also be able to serve "HTTPS-encrypted display ads to all HTTPS-enabled inventory."

Encrypting advertising traffic for mobile devices will protect against some man-in-the-middle attacks that researchers have warned about for years, where attackers could inject rogue code into advertising traffic to abuse the permissions of the apps displaying the ads.

It will also protect against ad injection attacks done at the network layer, for example, through compromised routers. However, it won't prevent locally installed adware programs like Superfish or malware threats from displaying rogue ads on HTTPS websites opened in the local browser.

Of course, in order for encryption to have a truly large scale impact, the entire online advertising industry needs to join in the effort.

According to the Interactive Advertising Bureau (IAB), a large advertising industry association, almost 80 percent of its members' ad delivery platforms support HTTPS. However, support and actual use are two different things. For ads to be delivered to a website over HTTPS, it's not enough for the site's primary ad server to support encryption. There's a lot that needs to happen in the complicated advertising supply chain as well.

"That ad server will sometimes need to include tags from brand safety, audience and viewability measurement, and other tools -- all of which also need to support encryption," explained IAB's Director of Technical Standards Brendan Riordan-Butterworth in a blog post in March.

The publisher's ad server will often direct to one of several agency ad servers, each of those will also need to serve over HTTPS. "Each agency ad server also may include a variety of beacons or tags, depending on how the deal was set up, all of which similarly need to have encrypted versions available," he wrote.

And simply encrypting the traffic won't stop malvertising attacks, which pose the biggest risk to users. These are attacks where criminals manage to push rogue ads onto an advertising network so that when those ads are displayed on popular websites they redirect users' browsers to servers hosting exploits. If successful, those exploits install malware programs on their computers.

Google had to deal with at least two malvertising attacks on its DoubleClick network over the past two weeks. In one of those cases, researchers from Dutch security firm Fox-IT tracked the malicious ads to a Bulgarian reseller of Google advertising services whose systems they believe were compromised.

Even if that reseller would have served ads over HTTPS, it wouldn't have prevented attackers with access to its ad platform from pushing malicious advertisements onto Google's network, said Fox-IT researcher Maarten van Dantzig Monday. Moreover, if the ad traffic had been encrypted, Fox-IT wouldn't have been able to pinpoint the offending ad campaign and track it down to the Bulgarian company, he said.

While the researcher agreed that Google's decision to encrypt ad traffic is generally good for everyone's security and privacy -- the whole Web should be encrypted, he said -- the move does have drawbacks; for one, it decreases the visibility of network defenders.

For example, a network security appliance won't be able to detect and block malicious code hidden inside encrypted advertising traffic unless the device is configured to also act as an HTTPS interception proxy -- decrypting and re-encrypting traffic with a self-signed CA certificate deployed on all endpoints. Many companies don't yet have such a set-up.

Malicious advertisements typically redirect browsers to Web-based exploits hosted on non-HTTPS servers, so network appliances might actually be able to detect and block the exploits themselves. However, researchers or network security analysts investigating such incidents will not be able to see which specific ad triggered it.

With less visibility for security researchers, advertising networks will need to identify the rogue ads on their own, van Dantzig said.

He wasn't sure if many of them are ready to do that.

Join the CSO newsletter!

Error: Please check your email address.

Tags Interactive Advertising BureauFox-ITonline safetyGooglesecurityencryptionmalwareprivacy

More about DoubleClickGoogleInteractiveInteractive Advertising BureauInteractive Advertising Bureau (IAB)Transport

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place