CyberWire Daily - When clicks turn criminal. [Research Saturday]

Episode Date: November 15, 2025

Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with ne...w threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns. The research can be found here: Deniability by Design: DNS-Driven Insights intoa Malicious Ad Network Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyberwire Network, powered by N2K. Step into the digital Upside Down with Cyber Things, Armist's new three-part podcast series, which will dive into the unseen world of cybersecurity. From real-life hacks to the digital shadows of the dark web, we connect pop culture and protection, fear and control. Episode one drops soon, so look out for Cyber Things in partnership with Cyberwire. Ever wished you could rebuild your network from scratch to make it more secure, scalable, and simple?
Starting point is 00:00:44 Meet Meter, the company reimagining enterprise networking from the ground up. Meter builds full-stack zero-trust networks, including hardware, firmware, and software, all designed to work seamlessly together. The result? fast, reliable, and secure connectivity without the constant patching, vendor juggling, or hidden costs. From wired and wireless to routing, switching, firewalls, DNS security, and VPN, every layer is integrated and continuously protected in one unified platform. And since it's delivered as one predictable monthly service,
Starting point is 00:01:20 you skip the heavy capital costs and endless upgrade cycles. Meter even buys back your old infrastructure to make switching, effortless. Transform complexity into simplicity and give your team time to focus on what really matters, helping your business and customers thrive. Learn more and book your demo at meter.com slash cyberwire. That's M-E-T-E-R dot com slash cyberwire. Hello everyone and welcome to the CyberWires Research Saturday. I'm Dave Bittner, and this is our weekly conversation with researchers and analysts tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves
Starting point is 00:02:15 in a rapidly evolving cyberspace. Thanks for joining us. So what we have found, particularly over the last year is essentially a lot of threats that we previously believed were associated with those actors hiding in the dark, working in those dark web forums, groups of hacker gangs. They in fact are being backed by registered businesses in various parts of the world. They advertise openly on the internet, and they provide a variety of advertising-related services. That's Dr. Renee Burton, Vice President of Threat Intelligence at InfoBlocks.
Starting point is 00:03:03 The research we're discussing today is titled Deniability by Design, DNS-driven insights into a malicious ad network. Well, let's dig in and talk about Vain Viper itself. How did you first come across this threat actor? So we first found a Vain Viper back in like 2022. And we found it similarly both through accidental things, but also through DNS. And at the time, they were heavily seen in compromised websites. I personally had the experience where I was just doing some browsing. And suddenly there was this little pop-up that said Omnator wants to show you,
Starting point is 00:03:54 notifications. Who's omnitor? I'm definitely not visiting that website. So I said no, which was good, because that turned out to be a lead into us discovering, again, through DNS by putting together, DNS here being the domain names, IP addresses. We put those together and realized this is actually an entire actor, meaning a, you know, a person or a group that we would be able to track and that they were heavily involved in both scams and in malware. And then it took us years, it took us about two years to realize that in fact they were registered companies. Wow. Well, before we dig into some more of the details, you mentioned DNS and your research points out that you and your team saw about a trillion with a T DNS queries linked to Vain Viper in just about a year.
Starting point is 00:04:51 Can you put that in perspective for us, what this means in terms of scale? Yeah, that trillion was within our customer environments as well. So if you think about it, you know, globally, it's actually going to be much larger. These are extraordinarily popular domains, meaning that there's a lot of traffic associated with them. They're going to be not as popular as Google, right? not as popular as Facebook, but they're still going to be up there more popular than very common VPN, security services, sharing systems, things like that. So tons and tons and tons of domain name traffic.
Starting point is 00:05:37 And to what that says to us is there is a lot of ways in which that actor is approaching both consumers and enterprises. And what exactly are they up to here? here. What's the approach and what are they hoping to get out of this? They're certainly financially motivated as a company. They're making money off of the people who sign up with them as, quote, publishers, meaning that they put the links on things and advertisers, which are the ones that show things. They are distributing both scams and malware. So they're affiliating or having advertisers who are the ones actually giving these scams in malware's. However, we also had
Starting point is 00:06:23 very specific instances, again, one coming from my own phone, where malware was dropped directly onto my device from an IP address that is theirs, that is in their network. Is there a legitimate side to their business? Or you all talk about plausible deniability in the report here is it all malware and uh scams it's mostly i think that that's just a side effect too of when you're in the this type of the the advertising business you're right you don't have the cachet of being google or being tabula any one of these really big well-known advertising networks and you are they are out of cyprus but they're Russian oriented so they get a different kind of traffic they're going to be seen on variety of like gambling sites or on cracking sites or on free video
Starting point is 00:07:31 download sites you'll see that their ads would be there that's one of the many ways that would happen and so you could you know you might argue well this illegal gambling site is is legitimate in some, you know, in some fashion and they're using them as a customer. I think also that we find with these ad tech businesses that they are trying to get people who want to make money. If you think about, you know, the world and the economy all over the world, it's quite varied. And there's a lot of hope around the world. So there's a lot of people in Indonesia, India, a variety of other companies. countries that face a lot of economic challenges. And what they see is basically marketing,
Starting point is 00:08:22 that affiliate marketing is a way that they can make money. And a lot of them will join in, you know, to do that kind of thing. So they might end up being led down a path where they're delivering scams, but in fact themselves are really just trying to find a way to make a, make bread, you know, put food on the table type of thing. Yeah. The research describes Veen Viper as being tied to ad tech holding and its subsidiaries, companies like propeller ads. Can you unpack that corporate structure for us?
Starting point is 00:08:59 There's shell companies. There's offshore registrations. There's a lot to unwind here. Ad tech holdings is one of, you know, many different actors that we're looking at, More recently, we also released on an actor known Vexrio whose structures are even more convoluted. In the case of ad tech holdings, everything that we're looking at really is in that advertising and marketing technology space. But there are a bunch of companies that they essentially advertise to be independent of each other, but are still under that holding. So Propeller Ads is probably their big flagship one.
Starting point is 00:09:41 But Propeller Ads itself has other entities like Money Tagged below that. There's a group called Zedo, which is independent in some ways, but it's still part of ad tech holding. So there's a lot of ownership aspects over the last more than a decade that really tie different companies together, including their hosting providers. Lots of personalities who are involved in the, particularly the Cyprus regional tech market. Well, can we dig into some of the tools that they're actually using here?
Starting point is 00:10:25 There's a lot of things going on for them to be able to do it with what they do. Can you walk us through some of that? So when we look at what sort of tools or tactics devices that they are using, they heavily use push notifications. This is widely used across malicious ad tech. And it's actually quite brilliant. It provides a mechanism for persistence on a device in that somehow or another you convince someone to allow notifications.
Starting point is 00:10:59 And now, instead of getting that one opportunity to scam them, you get an infinite number of opportunities. And even more than that, I recently had one where we were recording. We found, it's a different company, but it's similar, the information that they provide allows me to see what they're tracking about me. And I could see that they're charging the advertiser about five cents to get a push notification onto my phone. And then I can also see that they've already computed.
Starting point is 00:11:38 my conversion rate or the likelihood of me to actually look at that ad to be almost zero is just slightly above zero and yet they're pushing 100 notifications a day so if you think about that from the ad tech or ad tech holdings or propeller's side they're being able to push you know 100 notices a day onto a single device charging five cents or one whatever it is for that device, they're getting that money no matter what, even if the user doesn't kind of click on it. So they can just roll in, you know, roll in cash through these notifications because they're charging the advertisers to be able to show the notification, which is quite brilliant. That's one of the ways in which they're, one of the ways in which
Starting point is 00:12:31 they're handling victims. And they get it on both sides, right? They get the victim, but they also get the advertiser who is paying them in order to show these to show these advertisements is really interesting. The other thing that they do is they're providing a traffic distribution system or TDS is the term we would use. The concept there is that I'm giving you the offer or the ad that you're most likely to buy, which here is going to be the scam or the malware. So depending on your device type, where you are in the region, what kind of notification you already clicked. This would happen even if it was just a pop-up ad.
Starting point is 00:13:13 So say, for instance, maybe you're on a gaming site or a movie streaming site, sort of I know that so I can make tailored things to you as well as your IP address or your device type. And then I will funnel you through this TDS in order to deliver the offer that, one, you're more likely to buy, but two, I'm going to make money off of it as the advertising network. We'll be right back. At TALIS, they know cybersecurity can be tough and you can't protect everything, but with TALIS you can secure what matters most. With TALIS's industry-leading platforms, you can protect critical applications, data and identities,
Starting point is 00:14:02 anywhere and at scale with the highest ROI. That's why the most trusted, brands and largest banks, retailers, and healthcare companies in the world rely on TALIS to protect what matters most. Applications, data, and identity. That's TALIS. Learn more at TALIS group.com slash cyber. And now a word from our sponsor, ThreatL-L-L-E-S-E-S-E-R. And now, a word from our sponsor, ThreatL Locker, the powerful zero-trust enterprise solution that stops ransomware in its tracks. Allow listing is a deny-by-default software that makes application control simple and fast.
Starting point is 00:14:49 Ring fencing is an application containment strategy, ensuring apps can only access the files, registry keys, network resources, and other applications they truly need to function. Shut out cybercriminals with world-class endpoint protection from Threat Locker. Now, you all found some of these campaigns that look to the user like normal software downloads or even search pages. How would a victim typically stumble into one of these traps? So they can just be regularly browsing the web. That is absolutely one way that can happen, especially with pages. that are smaller or less common, and they've taken on advertising as a way to make some money
Starting point is 00:15:44 off of that page. It can come through parking systems we've found. It can come through compromised websites. It could come through spam. So a variety of ways will take the victim into that funnel, essentially. And then in those two cases that you're mentioning from the paper in one case we had a phone and that phone kind of met the criteria for for the malware download and it essentially said you know you need to download this file and when we did clicked it and downloaded it that turned out to be an information stealer as I recall but if you weren't the right person like your device was too old or too new or whichever whichever way in which you didn't match, or they thought you were, say, a security company, then instead
Starting point is 00:16:41 you got a Google search page. So you had just suddenly clicked up and showed a Google search page. And that's the decoy part of it. Right. Interesting. Now, one of the things that caught my eye in the research was sort of you and your colleagues going through this aha moment of shifting from, hey, propeller ads is being abused. to, wait a minute,
Starting point is 00:17:08 propeller ads might be complicit, or complicit, rather. Can you walk us through that process for you all? Yes, I think this is the process that we have to go through whenever there's a commercial entity involved, whether it be a small one or a big one, like Google, right? Every time that you see a company that's offering a commercial service, and is being abused,
Starting point is 00:17:38 then you need to understand, okay, what role specifically are they playing? It could be that they're just lazy, that they aren't checking information from their advertisers. It could be they're overwhelmed, right? Some people would argue this about how much Google, you know, there's a ton of malvertising
Starting point is 00:18:00 that comes through Google search, and people would argue whether there's too much or for whatever reasons they struggle to be able to handle that. It's one of the more popular things that happen. The other thing that happens is that the advertisers who are, say, doing malware or scams, those are typically what we call cloaked, meaning they're hiding as well. And they're doing that, say, independent of propeller in this case. So propeller could make an argument that we can't even see that it's bad,
Starting point is 00:18:34 because they've cloaked the ad. That is certainly true in the case of large groups like Facebook and Google. Those ads are cloaked. It may be hard for them to tell that. So there's a lot of complexity that comes down to, am I actually going to make an accusation of being involved or being complicit, knowingly catering to cyber criminals? In our case, we were able to show not once,
Starting point is 00:19:04 but many times we only highlight a few of those within the paper that we were getting malicious content delivery and specifically malware directly from the IP addresses that are known to be owned by propeller ads. So this wasn't a redirection where they were sending stuff to an external advertiser, and that external, quote, advertiser was delivered. wearing the malware, they were doing it off of their own infrastructure, which makes them
Starting point is 00:19:37 responsible. Looking at the bigger picture here, when we consider Vane Viper, is this just kind of part of the digital advertising ecosystem in which we live these days, is it's sort of the, I don't know, the dark underbelly of that world? Well, I'm really optimistic. I think what has happened is that a group, a large number of groups of organized crime, it predominantly driven out of Russian-speaking areas that's not exclusive, but it's predominantly that starting in around 2015,
Starting point is 00:20:22 were able to create an entire ecosystem. And they're successful in staying off the radar, in part because they weren't trying to be on CBS's front page, right? They were working in this other world of compromising domains and doing smaller sites and advertising. Because of the successful nature of their cloaking or their hiding of domains, it took a very long time for people to start to realize, wait a second, this is actually connected to the distribution of all kinds of malicious content,
Starting point is 00:21:01 including ones that lead to, you know, data breaches that people care a lot about and disinformation like the doppelganger Russian disinformation campaigns. Once that starts rolling and people start realizing these things go together, there is a traffic distribution system involved, Now we're moving along three, four, five more years in understanding things within the security industry. People are gaining momentum and realizing, oh, wait a second, these are registered companies. So the scrutiny on these companies is gaining momentum. It is going to get bigger and bigger and bigger.
Starting point is 00:21:39 And I am optimist. I think they will be held accountable. And I think we will find better defenses as we go forward. I admire your optimism. So based on the information that you all have gathered here, what are your recommendations? I mean, for both business leaders who are looking to protect their organization, but then also for everyday users, any words of wisdom here?
Starting point is 00:22:14 So for users, really don't accept notification. that's an important important thing altogether and to be somewhat suspicious if you see something that suddenly redirects you you know like you hit on something and then it showed you a Google search page or it showed you a Facebook or an Amazon just out of the blue that is probably part of malicious advertising and in every country in the world there is a way in which you you can report that activity to law enforcement. It is really important for us to report these things to law enforcement, whether we saw them and weren't victimized or more importantly when we are victimized
Starting point is 00:23:01 because that is what the momentum requires in order to get people taken care of to be able to understand the victimology of those things. Certainly putting in security measures, you know, wherever you can find security measures, that are going to specifically tackle traffic distribution systems, there's so hard to see and recognize and track that that kind of thing is going to be really helpful for you. As a consumer where you don't have money for big devices, things like an ad blocker will certainly help.
Starting point is 00:23:40 It's not perfect, but it would definitely help. Our thanks to Dr. Renee Burton from InfoBlocks for joining us. The research is titled Deniability by Design, DNS-driven insights into a malicious ad network. We'll have a link in the show notes. And that's Research Saturday, brought to you by N2K Cyberwire. We'd love to know what you think of this podcast. Your feedback ensures we deliver the insights that keep you a step ahead in the rapidly changing world of cybersecurity. If you like our show, please share a rating and review in your favorite podcast app.
Starting point is 00:24:21 Please also fill out the survey in the show notes or send an email to Cyberwire at n2k.com. This episode was produced by Liz Stokes. We're mixed by Elliot Peltzman and Trey Hester. Our executive producer is Jennifer Ivan. Peter Kilpe is our publisher, and I'm Dave Bittner. Thanks for listening. We'll see you back here next time. Thank you.
Starting point is 00:24:48 Thank you. I don't know. We're going to be.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.