Unlock stock picks and a broker-level newsfeed that powers Wall Street.

How a gang of crooks hijacked your web browser
Force-redirect ads like this one can be used to get you to download malware or pay ransom to criminals.
Force-redirect ads like this one can be used to get you to download malware or pay ransom to criminals.

If you’ve had a “forced-redirect” ad hijack your web browsing today and wanted to curse out some of the cretins responsible by name, you can now do so. And the name is as tacky as you might expect: Zirconium.

The identification comes in a report by the ad-security firm Confiant that unpacks how this group of con artists staged a massive ad-fraud campaign last year that included creating 28 phony ad agencies.

It’s yet another haul of evidence pointing out deep-seated rot in the “programmatic” part of the online ad business, in which ad networks match open space on sites with potential advertisers through automated auctions.

A multi-level malware machine

The operation Confiant describes was larger than most: The New York company estimates that Zirconium’s “malvertising” got seen about a billion times last year, and in seven days of December showed up on 62% of a panel of 600 sites that it monitored.

But the con was also more complex, in that Zirconium built fake firms to sell fake ads. This operation, itself hidden behind a Scottish shell company, created an ad network named MyAdsBro (yes, somebody thought this was a good name for a firm meant to sound legitimate) and then spawned 28 bogus ad agencies.

These companies’ websites look extremely similar, complete with buzzword-laden sales pitches and links to Twitter accounts spouting such marketing mumbo-jumbo as “Try to get the eventual user in online marketing” or “The main thing in online marketing is to have a progress report.”

Most point to a LinkedIn profile with a strikingly polished portrait picture that a Google (GOOG, GOOGL) reverse-image search reveals to be a stock photo.

A few of these online storefronts look sloppier than others. For instance, one fake firm that claims to run 4,600-plus ad campaigns lists a British street address that Google Maps shows as a rundown block of townhomes.

Ads like this one hijack your web browser preventing you from navigating away from them.
Ads like this one hijack your web browser preventing you from navigating away from them.

“We believe Zirconium was progressively rolling out their agencies to overcome occasional bans, as they progressively got caught,” Confiant’s report notes. “The dormant ones progressively built precious reputation (mostly history, and social media following) to pose as established companies and maximize their potential of striking deals with more ad platforms.”

Evading capture

Confiant co-founder and chief technology officer Jerome Dangu said that his New York firm first saw signs of the ad-fraud operation last February.

“We only realized that this was an organized group as we started connecting the dots by October 2017,” he said. “When they continued to ramp up their operations through Q4 2017, we organized to collect as much data as possible and aggressively report them to platforms.”