B&TB&TB&T
  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Technology
  • Regulars
    • Agency Scorecards
    • Best of the Best
    • Campaigns of the Month
    • CMO Power List
    • CMOs to Watch
    • Culture Bites
    • Fast 10
    • New Business Winners
    • Spotlight on Sponsors
  • Jobs
  • Awards
    • 30 Under 30
    • B&T Awards
    • Cairns Crocodiles
    • Women In Media
    • Women Leading Tech
Search
Trending topics:
  • Cairns Crocodiles
  • Nine
  • Seven
  • Cannes Lions
  • WPP
  • State of Origin
  • NRL
  • Pinterest
  • B&T Women in Media
  • Thinkerbell
  • AFL
  • imaa
  • Anthony Albanese
  • Spotlight on Sponsors
  • Meta
  • AI
  • Foxtel
  • TV Ratings
  • Radio Ratings
  • Sports Marketing

  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise
© 2025 B&T. The Misfits Media Company Pty Ltd.
Reading: How Chinese State Cybercriminals Used Advertising Technology To Hack Millions Of Systems
Share
B&TB&T
Subscribe
Search
  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Technology
  • Regulars
    • Agency Scorecards
    • Best of the Best
    • Campaigns of the Month
    • CMO Power List
    • CMOs to Watch
    • Culture Bites
    • Fast 10
    • New Business Winners
    • Spotlight on Sponsors
  • Jobs
  • Awards
    • 30 Under 30
    • B&T Awards
    • Cairns Crocodiles
    • Women In Media
    • Women Leading Tech
Follow US
  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise
© 2025 B&T. The Misfits Media Company Pty Ltd.
B&T > Technology > How Chinese State Cybercriminals Used Advertising Technology To Hack Millions Of Systems
Technology

How Chinese State Cybercriminals Used Advertising Technology To Hack Millions Of Systems

Staff Writers
Published on: 9th April 2020 at 9:46 AM
Staff Writers
Share
3 Min Read
Internet and network security.
SHARE

A startling new report has revealed how Advanced Persistent Threat (APT) groups operating on the behalf of the Chinese government used adware to target Windows and Android devices.

Decade of the RATs: Cross-Platform APT Espionage Attacks Targeting Linux, Windows and Android, released by BlackBerry, reveals how these Chinese hackers have managed to successfully target specific systems without detection since 2012.

The attacks particularly focussed on Linux servers, which run nearly all of the top 1 million websites online, 75 per cent of all web servers and 98 per cent of the world’s supercomputers.

The hackers used a number of different techniques to evade the many security systems that are in place, including adware, which is the software that generates online advertisements in a user interface.

By giving malware (malicious software that aims to damage or violate devices) adware code-signing certificates, these APT groups were able to increase the infection rates, as any red flags were simply dismissed as another blip in the constant stream of adware.

According to BlackBerry, this adware technology – that is used so widely in the online advertising ecosystem – offers a way for malicious actors to “hide in plain sight”.

“At first glance, using code-signing certificates belonging to adware developers seems completely counterproductive,” Blackberry says in the report.

“Malware that may previously have gone undetected would now almost surely be immediately noticed. At least a handful of antivirus vendors would flag it, if only on the basis of the adware code-signing certificate.

“Why would an attacker, particularly one aligned with the interests of a nation state, want to do that?”

However, it seems that by giving malware the disguise of adware, these hackers managed to reduce their risk of detection.

“In our judgement, these threat actors would rather be found and then ignored than found and investigated, particularly on the Windows platform where so much of the antivirus attention is focused,” BlackBerry explains.

“Malware masquerading as adware stands a good chance of being overlooked or disregarded if it is detected, especially in busy corporate enterprise environments because they manage a “stack” of multiple security technologies, each with its own set of alerts.”

Networks and host defenders are each day inundated with warnings of a potential breach.

BlackBerry suggests that these findings show the need for security operators to reassess how they determine “run-of-the-mill” nuisances versus malware that is potentially masquerading as adware.

 

Join more than 30,000 advertising industry experts
Get all the latest advertising and media news direct to your inbox from B&T.

No related posts.

TAGGED: China
Share
Staff Writers
By Staff Writers
Follow:
Staff Writers represent B&T's team of award-winning reporters. Here, you'll find articles crafted with industry experience spanning over 50 years. Our team of specialists brings together a wealth of knowledge and a commitment to delivering insightful, topical, and breaking news. With a deep understanding of advertising and media, our Staff Writers are dedicated to providing industry-leading analysis and reporting, both shaping the conversation and setting the benchmark for excellence.

Latest News

Telstra Launches One-Off Ad During State Of Origin Decider
11/07/2025
Clemenger BBDO Sydney office.
Agency Scorecard: Clemenger BBDO
11/07/2025
Matt Coote.
Matt Coote Takes New Senior Role At GumGum
11/07/2025
Spenser Skates.
Amplitude Acquires Kraftful To Embed AI-Native Voice Of Customer Capabilities
11/07/2025
//

B&T is Australia’s leading news publication magazine for the advertising, marketing, media and PR industries.

 

B&T is owned by parent company The Misfits Media Company Pty Ltd.

About B&T

  • About
  • Contact
  • Editorial Guidelines
  • Privacy
  • Terms
  • Advertise

Top Categories

  • Advertising
  • Campaigns
  • Marketing
  • Media
  • Opinion
  • Technology
  • TV Ratings

Sign Up for Our Newsletter



B&TB&T
Follow US
© 2025 B&T. The Misfits Media Company Pty Ltd. All Rights Reserved.
Welcome Back!

Sign in to your account

Register Lost your password?