Fraudulent ads can be cloaked at the creative and/or page level. This can be executed statically or dynamically.
Creative level
Ads that are cloaked on the creative level use two different methods to avoid detection and attack your users. They are generally focused on changing the image users interact with on top of the ad from an approved image, to a more engaging one that wouldn’t have made it through a DSP/SSP’s review process (fake news, shocking images, deceitful ads, etc.). There are two methods:
- Static Cloaking
In static cloaking, bad actors will submit an ad to be reviewed with a “good” creative, or one that will pass the review process. They will then manually swap the image file after the ad is approved with a malicious image that would have been flagged.Once the creative is switched, it will show the same malicious creative overtop the ad unit every time the ad is loaded. It has only been cloaked during the review process as a means to get past DSP/SSP’s ad standards.
- Dynamic Cloaking
In dynamic cloaking, the malicious actors have designed the ad to decide in real time whether to appear normal or malicious by setting certain parameters for the bad ad to be served. Otherwise, the ad will appear normal to not alert publishers to its hidden malicious intent.For example, if the bad actors are targeting users in Germany using Google Chrome on a mobile device, the bad ad will only appear when it recognizes that one or a combination of those conditions have been met.
This means that if the DSP/SSP review does not meet these set conditions, the ad will appear as normal and will be able to slip by disguised as a standard well-intentioned ad.
Landing page level
Ads that are cloaked at the landing page level work similarly to creative cloaked ads. But instead of cloaking the detection of a prohibited or deceitful image, they are used to hide an advertiser’s malicious URL.
Malicious landing pages are usually aimed at luring users into downloading malware, signing up for a credit card scam, or collecting user data. They are often disguised as legitimate web pages to deceive users into either believing the content is reputable or into sharing login information or other credentials.
The same two cloaking methods exist:
- Static Cloaking
Similar to creative cloaking, bad actors are also capable of swapping out URLs after the review process is completed.This means that when the ad is interacted with while under review, the ad will bring the user to an acceptable landing page, usually reasonably well suited to the creative being shown.Then, only after the ad is accepted, the malicious group will then swap out URLs for one that brings users to a landing page looking to steal information or install harmful software.
- Dynamic Cloaking
If an ad’s URL and landing page are dynamically cloaked, this again means the URLs are automatically swapped at runtime depending on the device, geolocation, and/or browser being used. If these conditions are not met, a stand-in, harmless URL will be displayed for the user to interact with.
Ads can be cloaked on more than one level at a time. Malvertisers may swap out an ad creative for a more engaging, unapproved one in order to boost their engagement and bring more users to your site.
Or they may swap both the creative and the URL to sneak harmful web pages through standard review processes, and serve them with unapproved clickbaity ads that will lure unsuspecting users in.
It is also possible for malvertisers with approved and successful creatives to be swapping out URLs for harmful ones.