Skip to content

BAD ACTORS
CAN’T HIDE
FROM US

hero-image

WE KNOW HOW ATTACKERS WORK…

Like any good villain, every attacker has a few tricks up their sleeve. And like any good superhero, we’re onto them all. Security by Confiant protects you and your users from all these issues with the first and only technology that detects and blocks in real-time.

Forceful Redirects

A technique attackers use to force visitors onto an unknown site where they may be infected with malware or shown a fake ad that collects personal information.

Learn More

Phishing Scams

A type of online scam where a criminal disguises themselves as a legitimate and trusted advertiser in order to steal sensitive information from the user.

Learn More

Pixel Stuffing

The process of compressing or "stuffing," one or more normal size ads into a single 1x1 pixel frame on a publisher's site. The ad becomes virtually invisible to the user but still triggers an impression with every visitor that lands on the site.

Learn More

Criminal Scams

Misleading, false or fraudulent messaging in advertising designed to steal money, personal information or both from victims.

Learn More

Unsafe and Malware Landing Pages

Landing page or website malware is software designed for malicious purposes: to allow attackers to evade detection or gain unauthorized access to a compromised environment. Common types include: injected SPAM, credit card theft, or forced redirects.

Learn More

Cryptocurrency Jacking

AKA malicious cryptomining. cybercriminals hack into someone's business or personal computer, laptop, or mobile device and use its power and resources to mine for cryptocurrencies or steal cryptocurrency wallets owned by unsuspecting victims.

Learn More

Fake Download Updates

A type of "drive-by download" used to trick site visitors into downloading malware that gives the attacker remote access to their device.

Learn More

Fake Ad Servers

When Hackers breach outdated servers and append malicious code to existing ads. This type of attack Confiant uncovered and labeled "Tag Barnacle" because the malicious code is attached to a previously valid Revive Ad server.

Learn More

Unsafe Click Trackers

AKA: Hyperlink Auditing is an HTML standard that can be used to track clicks on web site links. This is done by creating special links that ping back to a specified URL when they are clicked on. It can be used to illegally track personal information.

Learn More

Ad Stacking

When malvertisers layer multiple ads on top of one other, but only the top ad is visible. When the user clicks on the top ad, a click is registered for all the ads in the stack and advertisers end up paying for all those false ad impressions and clicks.

Learn More

Browser Fingerprinting

A form of cookieless tracking that users can’t easily discover or opt-out of.

Learn More

Exploit Kits

A type of toolkit cybercriminals use to distribute malware or perform other malicious activities.

Learn More

AND WE KNOW HOW TO TRACK THEM

Here are just a few of the many active threat groups we’re keeping an eye on. Wanna see the full threat actor and tactical list?

Zirconium

Zirconium

Like a splinter that won’t go away, these guys have been around for several years now. They’re notable for their persistence, technical prowess, and ability to adapt in a changing environment.

Yosec

Yosec

Yo, wait a sec. This is a threat actor that pushes fake Flash drive-by downloads and tech support scams via forced redirects.

DCCBoost

DCCBoost

Another threat thorn—and definitely not a “boost” malvertising defense. From a purely technical standpoint, their campaigns consistently include interesting malvertising innovations.

NOT TODAY, CYBER-CRIMINALS

Across the ad ecosystem, malvertisers are actively seeking to jeopardize your sites and take advantage of your users. These nefarious actors can make your site look sketchy, cost you millions in lost impressions, and steal valuable time from your Ad Ops team—but not for long.

WE HAVE DATA (AND WE KNOW HOW TO USE IT)

Our data is great—and our super skilled team is even better. We monitor impressions across the digital ad landscape, then deliver the intel you need to quickly isolate and address any issues.

icon13-red

Real-Time Tracking

Of what ads are being served and what we’ve blocked on your behalf.

icon14-red

Threat and Trends

Monitor the frequency and origin of bad ads, and when peak attacks occur.

icon15-red

Bad Ad Break Down

Get a full summary of all the issue types coming from your demand partners.

icon16-red

The Right Data, Right Now

Stay on top of security threats and attacks with alerts sent straight to your inbox.

WE’RE KEEPING THINGS SECURE FOR THE BEST IN THE BUSINESS

HOW CONFIANT UNCOMPLICATED COMPLEX MEDIA'S AD OPS

Complex Media is a multimedia platform and online community that publishes premium content around pop culture. With over 120 million people engaging with their content, providing a premium user & ad experience is a top priority.

complex
Read Case Study

TAKE US FOR A SPIN

Request a trial and see how it feels to have Confiant on your side.