ID | E1643 |
Objective(s) | Impact |
Related ATT&CK Techniques | Generate Traffic from Victim (T1643) |
Impact Type | Breach |
Version | 2.0 |
Created | 1 August 2019 |
Last Modified | 21 November 2022 |
Malware may generate traffic from the victim system such as clicks of advertising links that generate fraudulent ad revenue. The ATT&CK technique, Generate Traffic from Victim (T1643), is only associated with the mobile platform, but the behavior is applicable to other platforms as well.
Name | ID | Description |
---|---|---|
Advertisement Replacement Fraud | E1643.m02 | Malware injects ad windows onto websites the user views. [2] |
Click Hijacking | E1643.m01 | Malware alters DNS server settings to route to a rogue DNS server: when the user clicks on a search result link displayed through a search engine query, malware re-routes the user to different website. Instead of going to the requested site, the user is taken to an alternate website such that the click triggers payment to the threat actor. [1] |
Name | Date | Method | Description |
---|---|---|---|
DNSChanger | November 2011 | -- | Alters DNS server settings to route to a rogue DNS server for the purpose of click hijacking. [1] |
Kovter | 2016 | -- | Performs click-fraud. [4] |
[1] https://www.itworld.com/article/2734253/security/behind-the--massive--malware-ad-revenue-fraud-case.html
[2] https://www.fipp.com/news/insightnews/what-are-the-nine-types-of-digital-ad-fraud
[3] https://www.huffingtonpost.com/2011/11/09/click-hijack-hackers-online-ad-scam_n_1084497.html
[4] https://www.bleepingcomputer.com/virus-removal/remove-kovter-trojan