Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeCybersecurity 101
Malvertising

What Is Malvertising? The Hidden Threat in Online Advertising

Published: 8/25/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

Malvertising is a cyberattack method where criminals inject malicious code into legitimate online advertisements to distribute malware or redirect users to dangerous websites.

TL;DR

  • What is malvertising? Malvertising is a cyberattack method where criminals inject malicious code into legitimate online advertisements to distribute malware or redirect users to dangerous websites.

  • How malvertising works: Understand the techniques attackers use to inject malicious code into legitimate ads.

  • Risks involved: The potential dangers that malvertising poses to individuals and businesses.

  • How to protect yourself: Gain actionable tips to safeguard against malvertising threats while browsing online.

Malvertising represents one of the more insidious threats in cybersecurity because it exploits something we encounter daily: online advertisements. Unlike other cyberattacks that require users to visit suspicious websites or download questionable files, malvertising can strike through ads on completely legitimate, trusted websites.

The term combines "malicious" and "advertising," which perfectly captures how cybercriminals have weaponized the digital advertising ecosystem. What makes this attack particularly dangerous is that it doesn't require any specific action from the victim beyond normal web browsing.

How Malvertising works

Malvertising attacks follow a predictable pattern that exploits the complex digital advertising supply chain. Here's how cybercriminals execute these attacks:

Initial compromise

Attackers begin by targeting third-party advertising networks or servers. These networks serve millions of ads across thousands of websites, making them attractive targets. Once compromised, criminals inject malicious code into legitimate advertisements or ad components like banner images, videos, or interactive elements.

Distribution through legitimate channels

The infected advertisements then flow through normal advertising channels. Ad networks distribute these compromised ads to publisher websites, often without detection. Because the ads appear to come from legitimate sources, they bypass most initial security screenings.

Payloaddelivery

When users encounter these malicious ads, several things can happen:

  • Click-based attacks require user interaction. Clicking the ad triggers the malicious code, which may install malware, redirect to a dangerous website, redirect to a phishing website, or launch an exploit kit that scans for system vulnerabilities.

  • Drive-by downloads are more concerning because they don't require any user interaction. Simply loading a webpage with a malicious ad can trigger automatic malware downloads by exploiting browser or plugin vulnerabilities.

Post-infection activities

Once the malware is installed, it operates like any other form of malicious software. It might steal sensitive data, monitor user activity, establish backdoor access, or encrypt files for ransomware demands. The malware can also redirect internet traffic for the purposes of denial of service attacks or serve as a launching point for additional attacks.

Malvertising vs. Adware: Understanding the difference

Many people confuse malvertising with adware, but these are distinctly different threats that require different approaches to prevention and removal.

Malvertising is the attack method itself—the process of using corrupted advertisements to deliver malicious payloads. It's always malicious and often delivered without the user's knowledge or consent.

Adware is a type of software that displays advertisements, often in intrusive ways. While annoying, legitimate adware programs are typically installed with user consent (though often buried in lengthy terms of service agreements). Some adware crosses into malicious territory when it tracks users extensively, displays deceptive ads, steals passwords or session cookies, or proves difficult to remove.

The key distinction lies in consent and purpose. Legitimate adware serves marketing purposes and can be uninstalled through normal channels. Malvertising, however, exists solely to compromise systems and steal data or money.

Real-world Malvertising examples

Understanding how malvertising manifests in actual attacks helps illustrate why this threat is so concerning for cybersecurity professionals.

Angler Exploit Kit Campaign

This sophisticated attack demonstrated the power of drive-by malvertising. The Angler Exploit Kit automatically redirected website visitors to malicious pages without requiring any clicks or downloads. Once redirected, the kit exploited common vulnerabilities in Adobe Flash, Microsoft Silverlight, and Oracle Java to install malware silently.

The attack was particularly effective because it targeted widely used browser plugins that many users hadn't updated. According to the FBI's Internet Crime Complaint Center, exploit kits like Angler were responsible for a significant portion of malware infections during their peak operation.

RoughTed Campaign

The RoughTed malvertising campaign showcased how attackers can evade traditional security measures. This operation circumvented both ad blockers and antivirus solutions through dynamic URL generation and sophisticated traffic routing.

What made RoughTed particularly concerning was its use of legitimate infrastructure. The attackers leveraged Amazon's cloud services and content delivery network to make their malicious ads appear more trustworthy and harder to block. This is now known as domain fronting, where an attacker uses legitimate infrastructure such as AWS and Cloudflare to masquerade their malicious servers and domains.

KS Clean Mobile Malvertising

This campaign specifically targeted mobile users through in-app advertisements. The malicious ads would trigger fake security warnings, claiming the device was infected and needed an urgent "security update." Users who agreed to the update actually installed malware that granted attackers administrative access to their devices.

These examples share common characteristics: they targeted trusted platforms, used social engineering to increase effectiveness, and leveraged legitimate infrastructure to avoid detection.

Protection strategies against Malvertising

Defending against malvertising requires a multi-layered approach that addresses both individual user behavior and organizational security policies.

Individual user protection

  • Keep software updated: Regular updates to browsers, operating systems, and plugins close security vulnerabilities that malvertising exploits. Enable automatic updates when possible to ensure you receive security patches promptly.

  • Use Ad Blockers and security extensions: Quality ad blockers can prevent malicious advertisements from loading. Choose reputable options like uBlock Origin or AdBlock Plus, and keep them updated.

  • Disable unnecessary browser plugins: Adobe Flash and Java plugins are common targets for exploit kits. Disable these plugins unless absolutely necessary, and configure browsers to ask permission before running them. It is also possible to allow-list certain domains and restrict plugins from loading on un-approved websites.

  • Deploy comprehensive Antivirus solutions: Modern antivirus software can detect and block many malvertising attempts, especially those involving known malware families.

Organizational protection measures

  • Network-level filtering: Implement DNS filtering and web application firewalls to block access to known malicious domains and ad networks.

  • Employee education: Regular cybersecurity awareness training should include information about malvertising and safe browsing practices.

  • Endpoint detection and response: Advanced endpoint protection can identify and contain malvertising attacks even when they bypass traditional security measures.

Regular security assessments: Conduct periodic vulnerability assessments to identify and remediate security gaps that malvertising might exploit.

Why traditional security often fails

Malvertising presents unique challenges that make traditional cybersecurity approaches less effective. The sheer volume of digital advertisements—billions served daily—makes comprehensive screening nearly impossible. Ad networks prioritize speed and revenue, often leaving insufficient time for thorough security reviews.

The legitimate appearance of malvertised content also poses detection challenges. These ads come through established advertising channels and may appear identical to legitimate advertisements until activated. Many security tools struggle to differentiate between legitimate ads and malicious ones without triggering false positives that could disrupt normal business operations.

Additionally, the rapid evolution of malvertising techniques means that signature-based detection methods often lag behind new attack variants. Cybercriminals continuously adapt their methods to evade detection, creating an ongoing arms race between attackers and defenders.

Frequently Asked Questions

Yes, malvertising increasingly targets mobile users through in-app advertisements and mobile web browsing. Mobile devices face unique risks because users often have fewer security protections installed compared to desktop computers.

While ad blockers significantly reduce malvertising risk by preventing many advertisements from loading, they're not 100% effective. Some malvertising can bypass ad blockers, and users may whitelist sites that later serve malicious ads.

Absolutely. Major websites like The New York Times, BBC, and Forbes have all been affected by malvertising campaigns. The attacks typically originate from compromised ad networks rather than the websites themselves.

Malvertising infections can spread rapidly, especially in environments with shared network resources or inadequate endpoint protection. The speed depends on the specific malware deployed and the organization's security posture.

While most advertisements are legitimate, it's safest to avoid clicking on ads for unfamiliar products or services, especially those that seem too good to be true or create urgency. When interested in an advertised product, consider navigating directly to the company's official website instead.

Glitch effectBlurry glitch effect

Staying vigilant in the digital advertising landscape

Malvertising represents a fundamental challenge in our heavily relied-upon digital world. As online advertising continues to grow and evolve, so do the opportunities for cybercriminals to exploit this ecosystem. The attacks succeed because they abuse the trust relationships between advertisers, ad networks, publishers, and users.

The most effective defense against malvertising combines technological solutions with informed awareness. Organizations must implement comprehensive security measures while educating users about the risks inherent in digital advertising. Individual users benefit from understanding that even trusted websites can inadvertently serve malicious content through compromised advertising networks.

Moving forward, the cybersecurity community must continue developing advanced detection methods that can identify malvertising without disrupting legitimate advertising. This includes improving collaboration between security vendors, ad networks, and publishers to create more secure advertising ecosystems.

Remember that cybersecurity is an ongoing process, not a one-time implementation. Regular updates, continuous monitoring, and adaptive security strategies provide the best protection against malvertising and other evolving cyber threats.

Glitch effect

Related Resources


  • What is adware, and how can you protect your devices from it?
    What is adware, and how can you protect your devices from it?
    Learn what adware is, the signs of infection, removal tips, and steps to protect your devices from malicious adware. Read Huntress advice now.
  • What is an Exploit Kit?
    What is an Exploit Kit?
    Learn what exploit kits are, how they work, and why they're dangerous. Comprehensive guide covering detection, prevention, and current threats for cybersecurity professionals.
  • Click Fraud: What It Is and How to Protect Your Business
    Click Fraud: What It Is and How to Protect Your Business
    Learn what click fraud is, how bots and competitors exploit PPC ads, and discover proven strategies to detect and prevent fraudulent clicks on your campaigns.
  • What Is a Browser Extension? How They Work, Risks & Security Guide
    What Is a Browser Extension? How They Work, Risks & Security Guide
    A browser extension is a small software add-on that customizes your web experience—blocking ads, managing passwords, and more. Learn how they work, how they interact with websites, and how to stay safe while using them.
  • What is Adware Protection?
    What is Adware Protection?
    Learn about adware protection, its importance in cybersecurity, and how to defend against it. Discover detection techniques, prevention methods, and the difference between adware and malware.
  • What is a Drive-By Download Attack?
    What is a Drive-By Download Attack?
    Learn about drive-by download attacks, a sneaky cybersecurity threat where malware is downloaded to your device without your knowledge.
  • What Is SEO Poisoning?
    What Is SEO Poisoning?
    Learn about SEO Poisoning, a cybersecurity threat where attackers manipulate search results to spread malware or phishing links.
  • What Is PPC Security?
    What Is PPC Security?
    PPC Security protects your ad campaigns from click fraud, bots, and fake traffic. Learn how real-time monitoring and expert analysis stop wasted spend and improve ROI.
  • What is a Browser Helper Objective?
    What is a Browser Helper Objective?
    Learn what a Browser Helper Object (BHO) is, how it works, its risks, and its ties to cybersecurity. Simplified insights to help you stay protected.

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy