VB2017 paper: Exploring the virtual worlds of advergaming

Posted by   Martijn Grooten on   Apr 10, 2018

At VB2016 in Denver, Malwarebytes researchers Jérôme Segura and Chris Boyd presented a paper on malicious advertising, or malvertising. At the end of the paper, as they looked at the future of online ads, they discussed new trends in 'advergaming', or in-game ads.

This subject was the topic of a follow-up paper, presented by Chris at VB2017 in Madrid. In it, he looked at various aspects of advergaming, from unreadable EULAs to fake programs that promise to block ads.

advergaming-fig2.jpg

Today, we publish Chris's VB2017 paper in both HTML and PDF format; we have also uploaded the video of his presentation to our YouTube channel (with apologies for the missing beginning).

The programme for VB2018, which will take place in Montreal, 3-5 October, will be announced later this week – and we are pleased to announce that Malwarebytes will be partnering the event's evening networking reception on the 3 October!

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Throwback Thursday: Giving the EICAR test file some teeth

The 68-byte EICAR test file plays as important a role today as it did 19 years ago. In this week's Throwback Thursday we look back at a VB99 conference paper in which Randy Abrams described how this 'miracle tool' worked and how it could be used.

XMRig used in new macOS cryptominer

A new piece of cryptocurrency-mining malware on macOS has been found to use the popular XMRig miner.

Tendency for DDoS attacks to become less volumetric fits in a wider trend

CDN provider Cloudflare reports an increase in DDoS attacks targeting layer 7 and focusing on exhausting server resources rather than sending large volumes of data. This fits in a wider trend.

Turkish Twitter users targeted with mobile FinFisher spyware

Through fake social media accounts, users were tricked into installing an Android application that was actually a mobile version of the FinFisher spyware.

Hide'n'Seek IoT botnet adds persistence

The Hide'n'Seek IoT botnet has received an update to make its infection persist on infected devices beyond a restart.