{"id":18949,"date":"2021-08-09T22:14:48","date_gmt":"2021-08-09T22:14:48","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18949"},"modified":"2021-08-09T22:14:48","modified_gmt":"2021-08-09T22:14:48","slug":"malvertising-campaign-targets-iot-devices-geoedge","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/","title":{"rendered":"Malvertising Campaign Targets IoT Devices: GeoEdge"},"content":{"rendered":"<p>A malicious advertising campaign originating out of Eastern Europe and operating since at least mid-June is targeting Internet of Things (IoT) devices connected to home networks, according to executives with GeoEdge, which offers ad security and quality solutions to online and mobile advertisers.<\/p>\n<p>The executives said the \u201cmalvertising\u201d campaign \u2013 which was uncovered by GeoEdge\u2019s security research team with AdTech partners InMobi and Verve Group \u2013 came out of Ukraine and Slovenia and reached as far as the United States, though CEO Amnon Siev it has since been contained.<\/p>\n<p>With many people still <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/remote-workforce-security\/\">working from home<\/a> due to the global COVID-19 pandemic, an attack on IoT devices connected to home networks pose a threat to organizations whose employees may be doing their work on those same home networks, Siev told <em>eSecurity Planet<\/em>. And with <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\">many IoT devices unprotected<\/a> during the pandemic, the potential for an attack is substantial.<\/p>\n<p>\u201cThe new vector reveals browsing the web on the Wi-Fi network may open a gate to IoT attacks, which may have many impacts, including attacking enterprises,\u201d he said.<\/p>\n<h2>Malvertising is Evolving<\/h2>\n<p>According to GeoEdge, the widely distributed attack is an escalation in malvertising campaigns, where <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> is spread via the injection of malicious code into online display ads through online ad networks and passing that code into connected devices.<\/p>\n<p>This new campaign is the first to use online ads to silently install apps on home network-connected IoT devices. The attackers don\u2019t need to be particularly skilled to pull off such an attack, according to GeoEdge officials. They essentially need a basic understanding of device API documentation, some capability with JavaScript and low-level online advertising skills.<\/p>\n<p>The IT industry and online advertising world can expect similar attacks to follow a similar pattern, Siev said, adding that it represents the \u201cevolution of malvertising.\u201d The attack itself is low-cost with little sophistication. However, the distribution of the campaign is broad, which means the impact is high, he said.<\/p>\n<p>As with most malvertising campaigns, the ad networks were generally unaware about the malicious content. With this attack, end users targeted by the attack didn\u2019t have to click on the infected ad or navigate to a malicious web page to kick off the attack on the IoT devices. In most ways, the attack followed traditional malvertising means, Siev said.<\/p>\n<p>\u201cThis malicious campaign displays a fake Nike ad to the end user, but it also contains additional \u2018fingerprinting\u2019 code that is used to verify that it executes on an actual mobile device, in order to identify and hide from automated security scanning tools that are often used by security researchers,\u201d he said. \u201cOnce it identified such tools, it hides the malicious payload via cloaking to camouflage [itself and] appear as a benign, legitimate ad.\u201d<\/p>\n<h2>An Attack by a Criminal Ring<\/h2>\n<p>The CEO said the attacks were launched by a criminal ring rather than a state-sponsored group, though he didn\u2019t identify the name of the group. GeoEdge also couldn\u2019t say how many victims there were or what kinds of IoT devices were being attacked.<\/p>\n<p>Siev also couldn\u2019t say exactly what the attackers were looking for or how they were manipulating the devices but did say that generally bad actors target IoT devices to either steal personal information or money like credit card numbers and to manipulate home systems like gates, safes and door locks. They also may sell the personal data they find on the dark web.<\/p>\n<h2>IoT a Security Concern<\/h2>\n<p>The IoT for years has worried security professionals, who see it as greatly expanding the attack surface. The devices can range from the smallest sensors to machines on factory floors and include both consumer and corporate machines. Device developers at times will spend their money on features rather than security and the data on the devices often move between the devices and the cloud or on-premises data centers.<\/p>\n<p>IoT device security has also attracted the attention of federal government officials (see <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/the-iot-cybersecurity-act-of-2020-implications-for-devices\/\">The IoT Cybersecurity Act of 2020: Implications for Devices<\/a>).<\/p>\n<p>Cisco Systems is predicting that by 2023, there will be almost 30 billion connected devices and network connections, a rise from 18.4 billion in 2018. Of those, almost half \u2013 14.7 billion \u2013 of network devices <a href=\"https:\/\/blogs.cisco.com\/networks\/ing\/iot-and-the-network-what-is-the-future\">will be IoT devices<\/a>, up from the 33 percent three years ago, Cisco officials said. That makes home and industrial IoT an attractive target for bad actors who want to leverage malvertising, according to GeoEdge executives.<\/p>\n<h2>Will Get Worse Before It Improves<\/h2>\n<p>Simon Aldama, principal security advisor at IT services management company Netenrich, told <em>eSecurity Planet<\/em> that the risks associated with IoT security currently will get worse before they get better. Too often manufacturers prioritize releasing their products to market and interface connectivity rather than effective controls, all of which is made more difficult by the weak implementation of IoT standards, frameworks and basic security in designs.<\/p>\n<p>Aldama also said that the threat to enterprises in work-from-home scenarios is \u201chugely significant.\u201d<\/p>\n<p>\u201cHome networks are unhardened, unsegmented, unmanaged, unmonitored and sometimes consisting of up to 70 devices with unpatched vulnerabilities available for exploitation,\u201d he said. \u201cOrganizations expect cyber campaigns to exploit soft targets such as these to disrupt operations and associated supply chains. The delivery of malicious code through advertising supply chains is an insidious attack spanning over the course of 15 years. Threat actors have the capability to silently exploit millions of user endpoints without interacting with web page elements to carry out attacks such as <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a> delivery, identity theft, crypto mining or other forms of criminal monetization.\u201d<\/p>\n<h2>Spending on Digital Display Ads Increasing<\/h2>\n<p>Online display ads likely will continue to be an attractive target to cybercriminals. According to eMarketer, total digital ad spending will <a href=\"https:\/\/www.emarketer.com\/content\/worldwide-digital-ad-spending-2021\">reach $455.3 billion in 2021<\/a>, with 55.2 percent going to display advertising and 40.2 percent to search. The gap between the two ad models continues to tip in favor of display advertising, the firm said. Three years ago, there was only a 10 percent difference in spending between display and search ads. Helping to fuel the change are consumers increasingly embracing social media and digital video.<\/p>\n<p>\u201cThe consumer move to a preference for digital-first interactions will grow the potential threat landscape that can be targeted by attackers,\u201d Tyler Shields, chief marketing officer at JupiterOne, which offers cyber asset management and governance solutions, told <em>eSecurity Planet<\/em>. \u201cMore apps, more data in the cloud, more digital experiences mean more targets of both opportunity and chance. There will be a continued increase in data compromise as we move more and more of our daily life into the cloud. We&#8217;ve really only just begun to see the expansion of digital experiences and the attacks that will grow alongside them.\u201d<\/p>\n<p>There are steps enterprises can take to reduce the risk presented by employees working on insecure home networks, Aldama said. They include allowing conditional access to corporate infrastructure to hardened devices issued by IT, updating work-from-home policies and procedures, and security awareness training for those working remotely. In addition, organizations can adopt Secure Access Service Edge (SASE) access methods.<\/p>\n<p>Ultimately, there\u2019s only so much that users can do, GeoEdge\u2019s Siev said.<\/p>\n<p>\u201cFor users, antivirus [and] firewalls are not sufficient,\u201d he said. \u201cResponsibility lies in the hands of website owners and ad platforms to integrate a real-time ad quality tool.\u201d<\/p>\n\n\n<div id=\"ta-campaign-widget-66d7011dc0019-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7011dc0019\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7011dc0019\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7011dc0019\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7011dc0019\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7011dc0019\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7011dc0019\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A malicious advertising campaign originating out of Eastern Europe and operating since at least mid-June is targeting Internet of Things (IoT) devices connected to home networks, according to executives with GeoEdge, which offers ad security and quality solutions to online and mobile advertisers. The executives said the \u201cmalvertising\u201d campaign \u2013 which was uncovered by GeoEdge\u2019s [&hellip;]<\/p>\n","protected":false},"author":256,"featured_media":18950,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[6567],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31779],"class_list":["post-18949","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-iot-security","b2b_audience-awareness-and-consideration","b2b_product-iot-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malvertising Campaign Targets IoT Devices: GeoEdge | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"With IoT devices more exposed than ever during the pandemic, the effect of an IoT cyber attack could be devastating.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malvertising Campaign Targets IoT Devices: GeoEdge | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"With IoT devices more exposed than ever during the pandemic, the effect of an IoT cyber attack could be devastating.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-09T22:14:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1088\" \/>\n\t<meta property=\"og:image:height\" content=\"725\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeff Burt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeff Burt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\"},\"author\":{\"name\":\"Jeff Burt\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\"},\"headline\":\"Malvertising Campaign Targets IoT Devices: GeoEdge\",\"datePublished\":\"2021-08-09T22:14:48+00:00\",\"dateModified\":\"2021-08-09T22:14:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\"},\"wordCount\":1204,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg\",\"keywords\":[\"IoT security\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\",\"name\":\"Malvertising Campaign Targets IoT Devices: GeoEdge | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg\",\"datePublished\":\"2021-08-09T22:14:48+00:00\",\"dateModified\":\"2021-08-09T22:14:48+00:00\",\"description\":\"With IoT devices more exposed than ever during the pandemic, the effect of an IoT cyber attack could be devastating.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg\",\"width\":1088,\"height\":725,\"caption\":\"IoT security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malvertising Campaign Targets IoT Devices: GeoEdge\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e\",\"name\":\"Jeff Burt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg\",\"caption\":\"Jeff Burt\"},\"description\":\"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jburt\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malvertising Campaign Targets IoT Devices: GeoEdge | eSecurity Planet","description":"With IoT devices more exposed than ever during the pandemic, the effect of an IoT cyber attack could be devastating.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/","og_locale":"en_US","og_type":"article","og_title":"Malvertising Campaign Targets IoT Devices: GeoEdge | eSecurity Planet","og_description":"With IoT devices more exposed than ever during the pandemic, the effect of an IoT cyber attack could be devastating.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/","og_site_name":"eSecurity Planet","article_published_time":"2021-08-09T22:14:48+00:00","og_image":[{"width":1088,"height":725,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg","type":"image\/jpeg"}],"author":"Jeff Burt","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jeff Burt","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/"},"author":{"name":"Jeff Burt","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e"},"headline":"Malvertising Campaign Targets IoT Devices: GeoEdge","datePublished":"2021-08-09T22:14:48+00:00","dateModified":"2021-08-09T22:14:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/"},"wordCount":1204,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg","keywords":["IoT security"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/","url":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/","name":"Malvertising Campaign Targets IoT Devices: GeoEdge | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg","datePublished":"2021-08-09T22:14:48+00:00","dateModified":"2021-08-09T22:14:48+00:00","description":"With IoT devices more exposed than ever during the pandemic, the effect of an IoT cyber attack could be devastating.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Internet-of-Things-03-1088x725-1.jpeg","width":1088,"height":725,"caption":"IoT security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/malvertising-campaign-targets-iot-devices-geoedge\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Malvertising Campaign Targets IoT Devices: GeoEdge"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/62368dee45ce8f1ffc35abf9f8cc854e","name":"Jeff Burt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/07\/Jeff-Burt-photo-150x150.jpg","caption":"Jeff Burt"},"description":"Jeffrey Burt has been a journalist for more than three decades, the last 20-plus years covering technology. During more than 16 years with eWEEK, he covered everything from data center infrastructure and collaboration technology to AI, cloud, quantum computing and cybersecurity. A freelance journalist since 2017, his articles have appeared on such sites as eWEEK, eSecurity Planet, Enterprise Networking Planet, Enterprise Storage Forum, The Next Platform, ITPro Today, Channel Futures, Channelnomics, SecurityNow, and Data Breach Today.","url":"https:\/\/www.esecurityplanet.com\/author\/jburt\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18949"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18949"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18949\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18950"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18949"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18949"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18949"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}