<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p><span style="font-size: 12.1612px; background-color: transparent;"><img src="http://info.threatstop.com/hubfs/NoTroveCampaign.jpg" alt="NoTroveCampaign.jpg" width="454" height="227"></span></p> <p>&nbsp;</p> <p><span style="font-size: 12.1612px; background-color: transparent;">Internet-based advertising has been in wide use since the early 21st century. Its popularity grew in 2010 with the development of </span><a href="https://www.bloomberg.com/features/2015-click-fraud/" style="font-size: 12.1612px; background-color: transparent;">programmatic advertising</a><span style="font-size: 12.1612px; background-color: transparent;">. (Also referred to as automated advertainment) Here, you pay per ad view, which can be maliciously misused by counting machines and bots as actual viewers. Additional types of malicious use include accumulating web traffic and selling it to web traffic brokers, or engaging this traffic in semi-malicious programs like PUP. (Potentially Unwanted Programs)</span></p> <!--more--> <p><span style="font-size: 12.1612px; background-color: transparent;">The </span><strong style="font-size: 12.1612px; background-color: transparent;">NoTrove</strong><span style="font-size: 12.1612px; background-color: transparent;"> Campaign, discovered by </span><a href="https://www.riskiq.com/research/notrove-scam-empire/" style="font-size: 12.1612px; background-color: transparent;">RiskIQ</a><span style="font-size: 12.1612px; background-color: transparent;">, is a </span><a href="https://dochub.threatstop.com/display/TS/M#M-_malvertising" style="font-size: 12.1612px; background-color: transparent;">malvertising</a><span style="font-size: 12.1612px; background-color: transparent;"> campaign active since 2010. This campaign gives over the traffic originated through clicking fake advertisements to traffic brokers and affiliate programs. This campaign was found to have 78 variants differing in the type of counterfeit offers (survey, promo, prize, etc.), fake software downloads and various redirections that download PUPs or sites selling non-existent merchandise.</span></p> <p>The most common versions include scam survey rewards, fake software download<span>s</span> and redirections to PUPs.</p> <p>This campaign was found to use a unique form of hosts, seen in the structure below:</p> <p>&lt;DGA or highly random host&gt;.&lt;Campaign specific middle hosts&gt;.&lt;DGA or highly random host&gt;.&lt;tld&gt;. For example: bogzz.bestprizeland.8702[.]ws</p> <p><span style="font-size: 12.1612px; background-color: transparent;">The campaign’s middle host is attributed to type of scam the campaign used. Its been discovered that this campaign used approximately 2,000 domains and over 3,000 IP address.</span></p> <p><span style="font-size: 12.1612px; background-color: transparent;">ThreatSTOP IP Firewall Service and DNS Firewall Service protect against </span><strong style="font-size: 12.1612px; background-color: transparent;">NoTrove's</strong><span style="font-size: 12.1612px; background-color: transparent;"> campaign, if TSCritical targets are enabled in policies. If you only have ThreatSTOP IP Firewall service, we recommend adding the DNS Firewall service as well to enhance the protection that you can get from this (and other) campaigns.</span></p></span>