Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Advertising Internet Explorer Windows

Window Pain 223

Frequent Slashdot contributor Bennett Haselton contributes the following piece on trying to get some measure of satisfaction in the struggle against pop-up ads, writing "The most annoying thing about some pop-up ads, is that you have no way of knowing which ad-serving network served them or who the responsible parties are. Could we reduce the incidence of illegal or deceptive pop-up ads, by giving users an easier way to trace their origin and figure out where to send complaints? Here's one way to do it with a simple right-click." Read on for the rest.

Occasionally while I'm surfing the web and a pop-up ad opens, my Norton Anti-Virus will alert me that it blocked an "attack" on my computer, and then in Norton's logs of recently blocked attacks, it gives the URL of the content inside the pop-up ad that was blocked. Sometimes it indicates whether the "threat" was blocked under the category "scareware" (an ad that mimics a program scanning your PC for viruses and then claiming to find "infections," which you have to remove by purchasing the advertiser's software) or "malware" (an advertiser's page that tries to infect your computer directly by using JavaScript tricks to get around the browser's security features). I'm glad that Norton blocks the malware attacks, since even though I always have all the latest security patches installed for Internet Explorer, it's always possible that an attacker could be using an exploit that hasn't been patched yet. I don't really care about blocking the "scareware" ads, because I'm not going to fall for an ad that claims to be scanning my PC for viruses, but most Norton customers probably appreciate blocking those ads as well.

The problem in both cases is that it's hard even for an experienced user, and almost impossible for a novice user, to know where to send a complaint about the content in a pop-up window. You can usually figure out the URL of the content in the pop-up window (just right-click the window content and pick "Properties" in Internet Explorer or "View Page Info" in Firefox), but often the content itself is being served from an IP address in a jurisdiction like China or Cyprus where malicious operators are hard to shut down. What you really want is for them to stop serving their dangerous ads on reputable websites through the ad network. You could complain to the owner of the website that you're browsing, and say that a pop-up ad window from their site got blocked by Norton as a "virus," but if their site rotates ads from different providers, the site owner would have no way of knowing which advertising network served the ad. Even if you know the URL of the malicious content that was in the pop-up window, that's not enough to tell which advertising network it was served from (because ad networks typically don't serve the ads from their own domain; they just serve a redirect, which causes the browser to load the pop-up ad's contents from the advertiser's domain).

And even if you know which advertiser network served the ad, and the URL that the malicious pop-up content was served from (say, http://www.evilsite.cn/popup.html), so you can take your complaint directly to the advertising network, that may still not be enough information for them to figure out which of their advertisers served the malicious content and needs to be booted out of the network. Because all the advertiser network has is a list of ad pages for their different advertisers (http://www.advertiser-1.com/ad.html, http://www.adveritser-2.com/ad.html, etc.) — the advertiser buys the right to show ads, and the ad network displays ads that load content from those ad content pages. If one of those pages — say, http://www.adveritser-2.com/ad.html — redirects the user's browser to http://www.evilsite.cn/popup.html, the advertiser network has no way of knowing which advertiser is doing that. They would have to go through and check the ad-serving pages (http://www.advertiser-1.com/ad.html, http://www.adveritser-2.com/ad.html, and so one one at a time) for each of their advertisers, to see which of those pages redirect to http://www.evilsite.cn/popup.html — and by the time they do that, the advertiser might have altered the page so that it no longer redirects to the malicious content. While it's pretty straightforward to figure out what URL the malicious content is being loaded from, it's very difficult to figure out the chain of events that redirected you there, and who the responsible parties are.

So here's an idea for a simple browser feature that would make it a lot easier to hold malicious advertisers accountable, and get them kicked out of honest ad-serving networks. Simply give the user a way to right-click on the top of a browser window, and pick "View window origin" or something similar. This would display the sequence of redirects that opened the window, something like this:

Browser was visiting http://www.cnn.com/
http://www.cnn.com/ loaded JavaScript from http://www.advertiser-network.com/ads.js
http://www.advertiser-network.com/ads.js redirected browser to http://www.advertiser-2.com/ad.html
http://www.advertiser-2.com/ad.html redirected browser to http://www.evilsite.cn/popup.html

Then, if the user views an ad that is obviously scareware (or if Norton blocks the contents from loading and gives that as a reason), then the user can just right-click on the window and see the list of redirects. The user could then e-mail that to the website owner with a suggestion to do something about it ("The ad network on your page, has been infiltrated by an advertiser who is using the ad network to serve malicious content"), or the user could take the complaint to the advertiser network. The advertiser network would be able to see from the log, exactly which of their advertisers' ad.html pages served the malicious content.

(Yes, this comes on the heels of my article arguing that we should allow more intrusive ads as a way to help pay for services that can't finance themselves with normal pop-up ads. This may strike some people as "ironic" who haven't thought about it very carefully. Getting users to give larger amounts of their attention in exchange for premium service, is an honest and mutually beneficial transaction; scaring users with deceptive ads, or using ad space to try to infect their computer, is not. I think that Starbucks has the right to charge whatever they want for coffee; that doesn't mean they have the right to pee in your coffee.)

In order for this window-history-tracing feature to make a difference, at least the following two conditions also have to be true:

  • The advertiser network has to be honest (honest enough to kick out advertisers who they know are serving malicious content), or at least, be located in a jurisdiction where they have to worry about being sued or prosecuted if they don't kick bad apples out of their network.
  • When the malicious ads are served, enough users have to complain about them that the advertiser network takes notice. You wouldn't want the advertiser network to take action just based on a single complaint, since then anyone with a grudge could file a phony complaint against an advertiser in order to get them shut down, but if complaints start coming in from several sources, then they should investigate.

Fortunately, these would be likely to be true in many if not most cases where malicious pop-up windows are being served. With regard to the first condition, I've dealt with several advertising networks to find ads to serve on the proxy sites that I run, and they were all based out of law-and-order countries (the U.S., Canada, Israel, i.e. not China or Kazahkstan). As for the second condition, the advertiser would probably have to serve the ad to many different users in order to achieve their goal -- whether their goal is to infect users' machines, or to get them to buy the advertiser's fake anti-virus software, or whatever -- and as long as a fixed percentage of users viewing the malicious ads are inclined to file complaints about them, then the more the ads are served, the more complaints will come in until the ads are taken out of rotation.

Of course, if the URL that's actually serving the malicious content, is located in a law-and-order country, you could always just complain to the admins of the network where the content is being hosted. But that's likely to be less effective, since (a) the actual URLs that I've seen serving the malicious content, usually are located in cybercrime-infested nations like China, and (b) even if you get one of those sites shut down, the advertiser can instantly rotate in other sites with the same content, and make that the new URL that users are redirected to.

It is also of course true that some pop-up ads are spawned not by websites, but by malicious programs that actually infect your machine and force your browser to display pop-up windows. If some browser maker adopted the feature I'm suggesting, and stored a user-viewable "history" associated with each pop-up window, then a malicious program running on your machine might even be able to spoof the history associated with a pop-up window, so that the user would right-click on it and think it came from http://www.cnn.com/ instead of being spawned by malware. Once the user has their machine infected by a rogue program, nothing that any other application tells them can really be trusted after that point. So an advertiser network would have to be careful not to take action against an innocent third party, just based on a flood of complaints that were sent in by people whose machines were infected by malware that spoofs the origin of the pop-up windows. Fortunately, if the allegedly malicious ad is still in rotation, it would be easy for the advertiser network to check the validity of the complaint, by simply going to the advertiser's ad-content page, and seeing if it redirects to the malicious content. If it does, then you have grounds to boot the advertiser out of the network.

(You'd want to check the page's content from some anonymous IP address not affiliated with the advertiser network though. Otherwise, the advertiser might try to fool the ad network people, by showing "innocent" content when the page is loaded from the IP addresses associated with the ad network's office, and serving the scareware content to everybody else. Just trying to think of everything here.)

I'm sure there are other counter-strategies and counter-counter-strategies that would have to be taken into account, and kinks to be worked out, but probably not fatal to the whole idea. If a pop-up window opens on the user's computer that is possibly illegal, it is probably a good thing to give the user the tools to figure out where the ad came from, and which advertiser network to complain to. Right now, the ad window just floats there, and it's maddening not to have any way of knowing which ad-serving network put it there, or even if you can identify the ad-serving network, which of their advertisers created the content.

The main obstacle standing in the way of a major browser maker implementing this, may be that it doesn't bring any particular benefit to the users of that browser. When Microsoft adds SmartScreen to Internet Explorer, they can now claim that IE users are better-protected than users of other browsers. On the other hand, if the Mozilla Foundation adds the pop-up window right-click-history feature to their browser, they can't legitimately claim that Firefox users are better protected, since this feature wouldn't actually block anything. Firefox users would simply be better equipped to complain about malicious pop-up windows, and increase the chances of those rogue advertisements being taken down, or at least kicked out of ad networks where they would do the most damage. However, the benefits of that increased policing, would accrue to all Internet users, not just Firefox users.

Still, abuse desks get so many complaints about spam and spammers, that there are apparently plenty of people out there who get enough satisfaction from complaining about net abuse, that they would make use of the pop-up window-tracing feature if they had it. I know that when I see a stupid ad pretending to "scan" my computer for viruses, I get unreasonably disgusted, not from seeing the ad itself (which I can easily ignore), but from knowing that the advertiser has probably fleeced people of thousands of dollars with that ad. It would be nice to be able to help stop them before they cheat the next person.

This discussion has been archived. No new comments can be posted.

Window Pain

Comments Filter:
  • First (Score:0, Interesting)

    by Anonymous Coward on Thursday March 04, 2010 @03:17PM (#31361230)
    who the F&ck cares
  • Cat and mouse (Score:2, Interesting)

    by jgreco ( 1542031 ) on Thursday March 04, 2010 @03:25PM (#31361354)
    Generally speaking, bad actors will counter any move you make. Talking about miscreants who might respond with innocent content for requests from the ad network's IP space is naive; this has been happening for years already. It is quite common to see a lot of different defenses deployed to protect the bad actors, and accurately tracking them is rarely simple. It's part of the power and part of the problem that is HTML.
  • by abigor ( 540274 ) on Thursday March 04, 2010 @03:26PM (#31361366)

    He got into dogs and started writing books about them instead. Unfortunately, knowledgeable people in the "dog community" or whatever you call it have criticised him for killing his dogs at the first signs of illness, and for generally being a bad trainer. It's a familiar pattern - gain passing familiarity with something, pretend to be some deeply insightful authority and write about it, then retreat when things go pear-shaped (ie the Commodore 64 in Afghanistan, remember that?)

    The anti-Katz flaming was hilarious though. That was also the era of page-widening, Slashdot editor fan fiction, etc.

  • by Dracos ( 107777 ) on Thursday March 04, 2010 @03:58PM (#31361760)

    Your equation is missing a critical element: map known ad hostnames to your hosts file and map them to 0.0.0.0. DNS gets short circuited within localhost and immediately returns nothing. Much less work for Firefox and the aforementioned plugins.

    I have ~11,000 of these in my hosts file. I don't see ads. If some new ones sneak through, I add that host. Google seems to be tricky with their analytics stuff (Urchin), have to keep an eye on it.

  • by Animats ( 122034 ) on Thursday March 04, 2010 @04:00PM (#31361798) Homepage

    It's convenient that you can block ads in web browsers. That may be on the way out.

    You can't block ads on the iPad. One of the "advantages" being touted to advertisers [clickz.com] for the closed ecosystems of the various "ereaders" and "pads" is that they can have unblockable, unskippable ads. There hasn't been much about this in the popular press yet, but it's being of great interest in the advertising community, where more "control over the user experience", and less control by the user, is desired.

    You can already see a trend in this direction, with Flash-based video players which insert unskippable ads.

  • Bigger Issue (Score:2, Interesting)

    by Zaphod The 42nd ( 1205578 ) on Thursday March 04, 2010 @05:33PM (#31363030)
    Amen to alot you said. Yeah, people are going on and on about adblock (which I use, and is great) but I still think you made some good points regardless. As the internet is growing up, we need more and more simple ways for the average browser to educate himself (where did this ad come from?) and be able to send that information to the host. Maybe today its feasible for the host to try to manage himself, but the internet is only going to get bigger and bigger.

    I think this shows a more fundamental problem with browsers, (and even Operating System environments). I feel like we've been basing too much on just like, the first IE design of what a browser should look like.

    I remember when tabs first came about, it was so revolutionary! It COMPLETELY changed how we browse the internet, and now every browser and their mom has tabbed browsing built in. I'd like to see more things like this.
    For instance, if I've got open 15 tabs (on 3 different windows, between 2 different browsers, chrome and firefox), that should be completely managable. But then I get some pop-up that starts making LOUD noise (YOU WON AN IPOD!) and it takes me 10 minutes to go through all the tabs and figure out which page I need to block. I think there should be a built in browser equalizer. I should be able to mute and change the volume of my tabs at will; why not? Sound is becoming just as big a part of the internet as text. Not being able to change font sizes per page would be inexcusable, so why can't I change volumes?
    Getting information about and control over ads is just another area where I feel browsers have alot of room to grow.
  • by TheBoll ( 300428 ) on Thursday March 04, 2010 @06:17PM (#31363662)

    We know that you don't have to be an expert - but if you are not into computers and/or technology in general, it's really hard to keep up with these things. Half my co-workers do not know Firefox, and 80% and we work with data processing, for God's sake. For some of them, it seems It's just more comfortable to keep using the browser you're used to.

    And we must keep in mind that, among those who access the web, half of the demographic might not be computer-savvy. Take my aunt, for example: bought a laptop so she could do her work at home (she is a teacher), but that is pretty much the basics - word, excel, and a little internet on 'that program' that she don't even know the name.

    Also, you must be new here! Welcome to Slashdot. ;-)

  • Funny... (Score:1, Interesting)

    by Anonymous Coward on Thursday March 04, 2010 @10:31PM (#31366284)

    The parent post goes on and on about how broken everything is, but when he hits on Linux, he becomes a salesman.

It's a naive, domestic operating system without any breeding, but I think you'll be amused by its presumption.

Working...