Google's push to encrypt ads will improve security, but won't kill malvertising

The move might encourage more websites to deploy HTTPS

Google plans to serve most of its ads over encrypted HTTPS connections by the end of June, a move that will protect against some ad hijacking attacks and will encourage website owners to enable encryption on their Web properties.

However, malicious advertising attacks that direct users to Web-based exploits will still be possible and, because of the new encryption, it will be harder for security researchers to pinpoint their source.

Last year, Google announced that it will give more weight to HTTPS-enabled websites in search rankings in order to encourage the adoption of encryption across the Web. HTTPS (HTTP Secure) allows Web communication over a channel encrypted with the TLS (Transport Layer Security) protocol.

One of its main benefits is that it prevents the traffic from being read or modified by someone in a position to intercept it -- hackers in control of a router or prowling inside an insecure wireless network, rogue ISP employees, or a government agency spying on the Internet backbone.

A big problem webmasters have with implementing HTTPS is not the cost of buying digital certificates, but the fact that their websites load resources -- primarily advertisements -- from third parties that don't serve them over HTTPS. Loading non-encrypted resources into HTTPS websites will lead to mixed content warnings in browsers and cancels the security benefits of enabling HTTPS in the first place.

In this context, Google's efforts to start encrypting ad traffic will make transitioning to HTTPS easier for many websites, therefore increasing overall privacy and security on the Web.

By June 30 of this year, Google will encrypt "the vast majority" of mobile, video, and desktop display ads served to the Google Display Network, AdMob, and DoubleClick publishers, the company said Friday in a blog post. By this date, advertisers using any of Google's buying platforms, including AdWords and DoubleClick, will also be able to serve "HTTPS-encrypted display ads to all HTTPS-enabled inventory."

Encrypting advertising traffic for mobile devices will protect against some man-in-the-middle attacks that researchers have warned about for years, where attackers could inject rogue code into advertising traffic to abuse the permissions of the apps displaying the ads.

It will also protect against ad injection attacks done at the network layer, for example, through compromised routers. However, it won't prevent locally installed adware programs like Superfish or malware threats from displaying rogue ads on HTTPS websites opened in the local browser.

Of course, in order for encryption to have a truly large scale impact, the entire online advertising industry needs to join in the effort.

According to the Interactive Advertising Bureau (IAB), a large advertising industry association, almost 80 percent of its members' ad delivery platforms support HTTPS. However, support and actual use are two different things. For ads to be delivered to a website over HTTPS, it's not enough for the site's primary ad server to support encryption. There's a lot that needs to happen in the complicated advertising supply chain as well.

"That ad server will sometimes need to include tags from brand safety, audience and viewability measurement, and other tools -- all of which also need to support encryption," explained IAB's Director of Technical Standards Brendan Riordan-Butterworth in a blog post in March.

The publisher's ad server will often direct to one of several agency ad servers, each of those will also need to serve over HTTPS. "Each agency ad server also may include a variety of beacons or tags, depending on how the deal was set up, all of which similarly need to have encrypted versions available," he wrote.

And simply encrypting the traffic won't stop malvertising attacks, which pose the biggest risk to users. These are attacks where criminals manage to push rogue ads onto an advertising network so that when those ads are displayed on popular websites they redirect users' browsers to servers hosting exploits. If successful, those exploits install malware programs on their computers.

Google had to deal with at least two malvertising attacks on its DoubleClick network over the past two weeks. In one of those cases, researchers from Dutch security firm Fox-IT tracked the malicious ads to a Bulgarian reseller of Google advertising services whose systems they believe were compromised.

Even if that reseller would have served ads over HTTPS, it wouldn't have prevented attackers with access to its ad platform from pushing malicious advertisements onto Google's network, said Fox-IT researcher Maarten van Dantzig Monday. Moreover, if the ad traffic had been encrypted, Fox-IT wouldn't have been able to pinpoint the offending ad campaign and track it down to the Bulgarian company, he said.

While the researcher agreed that Google's decision to encrypt ad traffic is generally good for everyone's security and privacy -- the whole Web should be encrypted, he said -- the move does have drawbacks; for one, it decreases the visibility of network defenders.

For example, a network security appliance won't be able to detect and block malicious code hidden inside encrypted advertising traffic unless the device is configured to also act as an HTTPS interception proxy -- decrypting and re-encrypting traffic with a self-signed CA certificate deployed on all endpoints. Many companies don't yet have such a set-up.

Malicious advertisements typically redirect browsers to Web-based exploits hosted on non-HTTPS servers, so network appliances might actually be able to detect and block the exploits themselves. However, researchers or network security analysts investigating such incidents will not be able to see which specific ad triggered it.

With less visibility for security researchers, advertising networks will need to identify the rogue ads on their own, van Dantzig said.

He wasn't sure if many of them are ready to do that.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags Interactive Advertising BureauFox-ITonline safetyGooglesecurityencryptionmalwareprivacy

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments


Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >


Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >


Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >


Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles


PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?