Skip to content

Latest commit

 

History

History
59 lines (47 loc) · 2.22 KB

generate-traffic-from-victim.md

File metadata and controls

59 lines (47 loc) · 2.22 KB
ID E1643
Objective(s) Impact
Related ATT&CK Techniques Generate Traffic from Victim (T1643)
Impact Type Breach
Version 2.0
Created 1 August 2019
Last Modified 21 November 2022

Generate Traffic from Victim

Malware may generate traffic from the victim system such as clicks of advertising links that generate fraudulent ad revenue. The ATT&CK technique, Generate Traffic from Victim (T1643), is only associated with the mobile platform, but the behavior is applicable to other platforms as well.

Methods

Name ID Description
Advertisement Replacement Fraud E1643.m02 Malware injects ad windows onto websites the user views. [2]
Click Hijacking E1643.m01 Malware alters DNS server settings to route to a rogue DNS server: when the user clicks on a search result link displayed through a search engine query, malware re-routes the user to different website. Instead of going to the requested site, the user is taken to an alternate website such that the click triggers payment to the threat actor. [1]

Use in Malware

Name Date Method Description
DNSChanger November 2011 -- Alters DNS server settings to route to a rogue DNS server for the purpose of click hijacking. [1]
Kovter 2016 -- Performs click-fraud. [4]

References

[1] https://www.itworld.com/article/2734253/security/behind-the--massive--malware-ad-revenue-fraud-case.html

[2] https://www.fipp.com/news/insightnews/what-are-the-nine-types-of-digital-ad-fraud

[3] https://www.huffingtonpost.com/2011/11/09/click-hijack-hackers-online-ad-scam_n_1084497.html

[4] https://www.bleepingcomputer.com/virus-removal/remove-kovter-trojan