It is also the only one to use a recently patched Silverlight vulnerability. April 24, 2012 - Security Level: Light Purpose: To hide who you are while performing research through your browser. April 27, 2012 - Security Level: Medium Purpose: To hide who you are while performing research through your browser AND protecting your host system from drive-by download attacks.Malwarebytes Anti-Exploit blocks the malvertising attack when it launches the exploit kit: We notified the various ad networks when we first identified the attack as well as Cloud Flare; we will update this blog with any new relevant information. Benefits: Hide your IP Easy to set up Can be run off of a USB stick Drawbacks: Drive-by attacks can still lead to the infection of your host system. Benefits: Hide your IP Protect the host system by running in a virtual environment Execute malware in a safe environment (non-traffic capture) Drawbacks: Not as easy to setup Need to gather... May 22, 2012 - Since December of 2011, the spread of malicious advertisements, or “Malvertisements”, has drastically increased.Almost one year ago, distributed an Authority Report that included information on top traffic referral sources to our network.At the time, we reported that Facebook was still driving a higher percentage of traffic to news sites (41.4 percent) than Google (39.5 percent). As of the publish date of this post, Facebook still serves as a leading traffic source (42 percent) for Parse.ly’s network of publishers, but Google’s influence (31 percent) has declined significantly. , which previously outpaced Twitter as a traffic source to publishers, has also declined as a traffic referrer; it now drives only 1.6 percent of all referral traffic to Parse.ly’s network of sites, a 5.2 percent decline over two years.If you’re like everybody else managing a website online, you’ve dealt with the annoyance of getting into your site analytics to check out your traffic only to find that it’s filled with a bunch of spammy, junk websites as your top referrers.
The referral dashboard allows you to compare the biggest referrers, like Facebook and Google, but also allows you to track and compare other meaningful sources of traffic that don’t get as much attention.
Thus, the technique simulates several alternate realities: in each one we “resample” the data by building a dataset where each customer has a chance of being left out entirely, included exactly once (as in reality) be being included multiple times.
For each of these alternate realities, we keep track of the share of referrals from external sources like Facebook or Google.
For more background on what referrer spam is, check out this article by DMJ Computer Services.
This spammer/bad host referrer list, initially compiled by developers in this Reddit thread by user printerwoes is a fantastic starting point.