{"id":1578,"date":"2020-09-30T15:47:32","date_gmt":"2020-09-30T15:47:32","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=1578"},"modified":"2020-12-28T14:08:13","modified_gmt":"2020-12-28T14:08:13","slug":"what-is-malvertising-examples-and-protection-tips","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/","title":{"rendered":"What is Malvertising? Explore 6 Real-Life Examples &#038; Protection Tips"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Explore how to recognize a malvertisement and protect yourself from getting hacked &nbsp;&nbsp;&nbsp;<\/h2>\n\n\n\n<p><strong>Malvertising&nbsp;= malicious advertising.<\/strong> Basically, it\u2019s&nbsp;a&nbsp;way for cybercriminals to spread&nbsp;<a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">malware<\/a>&nbsp;(malicious software)&nbsp;through ad displays on websites and apps.&nbsp;Malware means any codes, scripts, commands, and software that are made to&nbsp;carry out&nbsp;a cybercrime&nbsp;or another malicious activity.&nbsp;And when malware is hidden in an advertisement, it becomes a&nbsp;malvertisement.<\/p>\n\n\n\n<p>In this article, we&#8217;ll discuss what&nbsp;malvertising&nbsp;is, how it works, and what you can do to protect yourself from them.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Makes&nbsp;Malvertising a&nbsp;Cyberthreat?&nbsp;&nbsp;<\/h2>\n\n\n<p><!-- [if gte mso 9]><xml>\n <o:OfficeDocumentSettings>\n  <o:AllowPNG\/>\n <\/o:OfficeDocumentSettings>\n<\/xml><![endif]--><!-- [if gte mso 9]><xml>\n <w:WordDocument>\n  <w:View>Normal<\/w:View>\n  <w:Zoom>0<\/w:Zoom>\n  <w:TrackMoves\/>\n  <w:TrackFormatting\/>\n  <w:PunctuationKerning\/>\n  <w:ValidateAgainstSchemas\/>\n  <w:SaveIfXMLInvalid>false<\/w:SaveIfXMLInvalid>\n  <w:IgnoreMixedContent>false<\/w:IgnoreMixedContent>\n  <w:AlwaysShowPlaceholderText>false<\/w:AlwaysShowPlaceholderText>\n  <w:DoNotPromoteQF\/>\n  <w:LidThemeOther>EN-US<\/w:LidThemeOther>\n  <w:LidThemeAsian>X-NONE<\/w:LidThemeAsian>\n  <w:LidThemeComplexScript>X-NONE<\/w:LidThemeComplexScript>\n  <w:Compatibility>\n   <w:BreakWrappedTables\/>\n   <w:SnapToGridInCell\/>\n   <w:WrapTextWithPunct\/>\n   <w:UseAsianBreakRules\/>\n   <w:DontGrowAutofit\/>\n   <w:SplitPgBreakAndParaMark\/>\n   <w:EnableOpenTypeKerning\/>\n   <w:DontFlipMirrorIndents\/>\n   <w:OverrideTableStyleHps\/>\n  <\/w:Compatibility>\n  <m:mathPr>\n   <m:mathFont m:val=\"Cambria Math\"\/>\n   <m:brkBin m:val=\"before\"\/>\n   <m:brkBinSub m:val=\"&#45;-\"\/>\n   <m:smallFrac m:val=\"off\"\/>\n   <m:dispDef\/>\n   <m:lMargin m:val=\"0\"\/>\n   <m:rMargin m:val=\"0\"\/>\n   <m:defJc m:val=\"centerGroup\"\/>\n   <m:wrapIndent m:val=\"1440\"\/>\n   <m:intLim m:val=\"subSup\"\/>\n   <m:naryLim m:val=\"undOvr\"\/>\n  <\/m:mathPr><\/w:WordDocument>\n<\/xml><![endif]--><!-- [if gte mso 9]><xml>\n <w:LatentStyles DefLockedState=\"false\" DefUnhideWhenUsed=\"false\"\n  DefSemiHidden=\"false\" DefQFormat=\"false\" DefPriority=\"99\"\n  LatentStyleCount=\"376\">\n  <w:LsdException Locked=\"false\" Priority=\"0\" QFormat=\"true\" Name=\"Normal\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" QFormat=\"true\" Name=\"heading 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 7\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 8\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"9\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"heading 9\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 6\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 7\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 8\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index 9\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 7\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 8\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"toc 9\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Normal Indent\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"footnote text\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"annotation text\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"header\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"footer\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"index heading\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"35\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"caption\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"table of figures\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"envelope address\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"envelope return\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"footnote reference\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"annotation reference\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"line number\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"page number\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"endnote reference\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"endnote text\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"table of authorities\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"macro\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"toa heading\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Bullet\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Number\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Bullet 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Bullet 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Bullet 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Bullet 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Number 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Number 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Number 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Number 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"10\" QFormat=\"true\" Name=\"Title\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Closing\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Signature\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"1\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"Default Paragraph Font\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text Indent\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Continue\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Continue 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Continue 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Continue 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"List Continue 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Message Header\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"11\" QFormat=\"true\" Name=\"Subtitle\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Salutation\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Date\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text First Indent\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text First Indent 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Note Heading\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text Indent 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Body Text Indent 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Block Text\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Hyperlink\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"FollowedHyperlink\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"22\" QFormat=\"true\" Name=\"Strong\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"20\" QFormat=\"true\" Name=\"Emphasis\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Document Map\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Plain Text\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"E-mail Signature\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Top of Form\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Bottom of Form\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Normal (Web)\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Acronym\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Address\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Cite\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Code\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Definition\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Keyboard\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Preformatted\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Sample\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Typewriter\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"HTML Variable\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Normal Table\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"annotation subject\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"No List\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Outline List 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Outline List 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Outline List 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Simple 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Simple 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Simple 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Classic 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Classic 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Classic 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Classic 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Colorful 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Colorful 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Colorful 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Columns 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Columns 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Columns 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Columns 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Columns 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 6\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 7\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Grid 8\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 4\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 5\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 6\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 7\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table List 8\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table 3D effects 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table 3D effects 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table 3D effects 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Contemporary\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Elegant\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Professional\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Subtle 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Subtle 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Web 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Web 2\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Web 3\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Balloon Text\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" Name=\"Table Grid\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Table Theme\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" Name=\"Placeholder Text\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"1\" QFormat=\"true\" Name=\"No Spacing\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" Name=\"Revision\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"34\" QFormat=\"true\"\n   Name=\"List Paragraph\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"29\" QFormat=\"true\" Name=\"Quote\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"30\" QFormat=\"true\"\n   Name=\"Intense Quote\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"60\" Name=\"Light Shading Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"61\" Name=\"Light List Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"62\" Name=\"Light Grid Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"63\" Name=\"Medium Shading 1 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"64\" Name=\"Medium Shading 2 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"65\" Name=\"Medium List 1 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"66\" Name=\"Medium List 2 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"67\" Name=\"Medium Grid 1 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"68\" Name=\"Medium Grid 2 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"69\" Name=\"Medium Grid 3 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"70\" Name=\"Dark List Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"71\" Name=\"Colorful Shading Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"72\" Name=\"Colorful List Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"73\" Name=\"Colorful Grid Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"19\" QFormat=\"true\"\n   Name=\"Subtle Emphasis\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"21\" QFormat=\"true\"\n   Name=\"Intense Emphasis\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"31\" QFormat=\"true\"\n   Name=\"Subtle Reference\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"32\" QFormat=\"true\"\n   Name=\"Intense Reference\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"33\" QFormat=\"true\" Name=\"Book Title\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"37\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" Name=\"Bibliography\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"39\" SemiHidden=\"true\"\n   UnhideWhenUsed=\"true\" QFormat=\"true\" Name=\"TOC Heading\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"41\" Name=\"Plain Table 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"42\" Name=\"Plain Table 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"43\" Name=\"Plain Table 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"44\" Name=\"Plain Table 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"45\" Name=\"Plain Table 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"40\" Name=\"Grid Table Light\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"Grid Table 1 Light\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"Grid Table 6 Colorful\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"Grid Table 7 Colorful\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"Grid Table 1 Light Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"Grid Table 6 Colorful Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"Grid Table 7 Colorful Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"Grid Table 1 Light Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"Grid Table 6 Colorful Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"Grid Table 7 Colorful Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"Grid Table 1 Light Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"Grid Table 6 Colorful Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"Grid Table 7 Colorful Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"Grid Table 1 Light Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"Grid Table 6 Colorful Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"Grid Table 7 Colorful Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"Grid Table 1 Light Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"Grid Table 6 Colorful Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"Grid Table 7 Colorful Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"Grid Table 1 Light Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"Grid Table 2 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"Grid Table 3 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"Grid Table 4 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"Grid Table 5 Dark Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"Grid Table 6 Colorful Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"Grid Table 7 Colorful Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\" Name=\"List Table 1 Light\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\" Name=\"List Table 6 Colorful\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\" Name=\"List Table 7 Colorful\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"List Table 1 Light Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"List Table 6 Colorful Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"List Table 7 Colorful Accent 1\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"List Table 1 Light Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"List Table 6 Colorful Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"List Table 7 Colorful Accent 2\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"List Table 1 Light Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"List Table 6 Colorful Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"List Table 7 Colorful Accent 3\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"List Table 1 Light Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"List Table 6 Colorful Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"List Table 7 Colorful Accent 4\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"List Table 1 Light Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"List Table 6 Colorful Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"List Table 7 Colorful Accent 5\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"46\"\n   Name=\"List Table 1 Light Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"47\" Name=\"List Table 2 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"48\" Name=\"List Table 3 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"49\" Name=\"List Table 4 Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"50\" Name=\"List Table 5 Dark Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"51\"\n   Name=\"List Table 6 Colorful Accent 6\"\/>\n  <w:LsdException Locked=\"false\" Priority=\"52\"\n   Name=\"List Table 7 Colorful Accent 6\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Mention\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Smart Hyperlink\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Hashtag\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Unresolved Mention\"\/>\n  <w:LsdException Locked=\"false\" SemiHidden=\"true\" UnhideWhenUsed=\"true\"\n   Name=\"Smart Link\"\/>\n <\/w:LatentStyles>\n<\/xml><![endif]--><\/p>\n<p>Malvertising refers to malicious advertisements that look real. These ads spread malware through legitimate websites. What makes malvertising particularly tricky is that users might not be able to differentiate between real ads and fake ones. After all, if an ad is displayed on a website that users trust, why would they question whether it\u2019s real?\u00a0<\/p>\n<p><!-- \/wp:post-content --><!-- wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>If malware gets inside your device, it can:\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Gain\u00a0unauthorized access to\u00a0your\u00a0device,\u00a0\u00a0<\/li>\n<li>Crash your system,\u00a0\u00a0<\/li>\n<li>Monitor\u00a0your\u00a0actions\u00a0and capture sensitive information (such as passwords),\u00a0\u00a0<\/li>\n<li>Encrypt and steal your data\u00a0via\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/5-best-ransomware-protection-tips-to-protect-your-organization\/\" target=\"_blank\" rel=\"noreferrer noopener\">a ransomware attack<\/a>,\u00a0\u00a0<\/li>\n<li>Use\u00a0your\u00a0device\u00a0as part of larger\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/botnet-attacks-what-is-a-botnet-how-does-it-work\/\" target=\"_blank\" rel=\"noreferrer noopener\">botnet attacks<\/a>\u00a0against others,\u00a0and\u00a0\u00a0<\/li>\n<li>Engage in other\u00a0harmful activities.\u00a0\u00a0<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Scammers officially rent ad space on the reputed websites, insert the malicious codes in the advertisements, and publish them. The ads look genuine, tempting, and coming from a trusted source. The host website owner may or may not be aware that their website is displaying\u00a0malvertising.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>So, if you see an ad on a reputable website that promises \u201c25% off iPhones for Amazon Prime users,\u201d it might be a malvertisement. If you click on such an ad, you won\u2019t be redirected to the official Amazon website. Instead, it may take you to a malicious website or download malware onto your device. Either way, this is bad news for you.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>These are some of the popular websites that have been the victims of\u00a0malvertising\u00a0in the past:\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Yahoo.com,\u00a0\u00a0<\/li>\n<li>Spotify,\u00a0\u00a0<\/li>\n<li>London Stock Exchange,\u00a0\u00a0<\/li>\n<li>MySpace,\u00a0\u00a0<\/li>\n<li>The\u00a0New\u00a0York\u00a0Times,\u00a0\u00a0<\/li>\n<li>Hindustan Times\u00a0<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:html --><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"664\" height=\"370\" class=\"wp-image-1579 addshadow\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-4.png\" alt=\"A screenshot of a tweet from The New York Times' Twitter feed warning about malvertising\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-4.png 664w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-4-300x167.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-4-560x312.png 560w\" sizes=\"auto, (max-width: 664px) 100vw, 664px\" \/>\n<figcaption>Image source:\u00a0<a href=\"https:\/\/twitter.com\/nytimes\/status\/3958547840\" target=\"_blank\" rel=\"noreferrer noopener\">The New York Times\u2019 Twitter page<\/a>\u00a0<\/figcaption>\n<\/figure>\n<\/div>\n<p><!-- \/wp:html --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>6 Types of\u00a0Malvertising\u00a0<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Malvertisements\u00a0come in all shapes and sizes.\u00a0Hackers can even make invisible malvertisements using iframes\u00a0(which we\u2019ll discuss shortly)!\u00a0\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3><em>1.\u00a0Content\/Text-Based\u00a0Malvertisements<\/em><\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Attackers\u00a0insert\u00a0malicious\u00a0codes in\u00a0simple\u00a0text-based\u00a0advertisements\u00a0on host websites, typically\u00a0in the sidebars\u00a0or in the\u00a0main\u00a0content\u00a0body.\u00a0Hackers might\u00a0also embed malvertising as\u00a0part of sponsored article\u00a0content.\u00a0\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3><em>2. Banners<\/em>\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Attackers make advertisement banners in a way that they lure the website visitors into clicking on them.\u00a0Banner ads often display:\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Fake deals and coupon codes,\u00a0\u00a0<\/li>\n<li>Fake virus infection-related messages to incite panic, or\u00a0\u00a0<\/li>\n<li>Some other sort of tempting messages to indulge people in clicking on the banners.\u00a0\u00a0<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Attackers can also impersonate\u00a0reputable\u00a0companies and organizations, using\u00a0their logos\u00a0and product pictures to gain people&#8217;s trust.\u00a0\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>For example, look at the banner below. It looked like a genuine Bing ad offering a free advertisement credit. But it could be a\u00a0malvertisement, and when you click on it, you might be redirected to a spammy site, or\u00a0malware gets downloaded on your system.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:html --><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"646\" height=\"290\" class=\"wp-image-1582 addshadow\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-7.png\" alt=\"A malvertising example of prophet.ca of a fake Microsoft-Bing ad\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-7.png 646w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-7-300x135.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-7-560x251.png 560w\" sizes=\"auto, (max-width: 646px) 100vw, 646px\" \/>\n<p>\u00a0<\/p>\n<figcaption>Image source:\u00a0<a href=\"https:\/\/www.prophet.ca\/blog\/malvertising-another-reason-not-click-web-ads\" target=\"_blank\" rel=\"noreferrer noopener\">prophet.ca<\/a>\u00a0<\/figcaption>\n<\/figure>\n<\/div>\n<p><!-- \/wp:html --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3><em>3. Video\u00a0Ads<\/em>\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Attackers make catchy video ads to grab users&#8217; attention. These malware-laden\u00a0videos look like legit product\/services ads, or they might even have\u00a0clips of\u00a0video\u00a0games,\u00a0popular sports,\u00a0celebrity\u00a0interviews,\u00a0breaking news, etc.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3><em>4. Animated\u00a0Ads<\/em>\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Attackers misuse Java scripts or flash player while making animated\/motion ads and insert malicious codes in them.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3><em>5. Inline Frames (iFrames)<\/em>\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>An\u00a0iframe is one of the HTML features\u00a0that\u00a0developers use to showcase one platform&#8217;s content to another. But attackers exploit the iframe mechanism by keeping its dimensions\u00a0set to 0 x 0\u00a0pixels. That means the website visitors can&#8217;t see any content, but the host website still carries\u00a0it. Malware automatically downloads after website visitors spend a couple of seconds on the website or accidentally click on the iframe-inserted part.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3><em>6. Popup\u00a0Ads\u00a0<\/em><\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Popups are the small windows that suddenly open up when you are browsing a webpage.\u00a0Attackers\u00a0use popups for\u00a0malvertising. Fake virus infection and free virus removal tools&#8217; popups are quite popular. Sometimes attackers show popups for a survey, polls, coupon codes, lightning deals for a limited period of time, free products, free\u00a0subscriptions, etc.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Check out the example below. The popup makes\u00a0you think that you think you are lucky to win a Costco gift card, but it can just be a\u00a0malvertisement.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:html --><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"394\" height=\"676\" class=\"wp-image-1580 addshadow\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-5.png\" alt=\"A malvertising example that tries to look like a legitimate Costco ad\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-5.png 394w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-5-175x300.png 175w\" sizes=\"auto, (max-width: 394px) 100vw, 394px\" \/>\n<p>\u00a0<\/p>\n<figcaption>Image source:\u00a0<a href=\"https:\/\/b3nac.com\/posts\/2019-02-16-How-to-hunt-for-Malvertising-ads-on-Android.html\" target=\"_blank\" rel=\"noreferrer noopener\">b3nac.com<\/a>\u00a0<\/figcaption>\n<\/figure>\n<\/div>\n<p><!-- \/wp:html --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>How Attackers Publish Malvertisements On Legit Websites?\u00a0\u00a0<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>You might be thinking, why would any reputable platform allow scammers to publish compromised advertisements on their site? After all, this could ruin their reputation! The thing is, there are many layers and complexity involved in online advertising \u2014 lots of sites, networks, and servers. Let\u2019s explore how attackers get their malicious ads on legitimate websites.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>1. Use Third-Party Ad Distributors to Extend Their Reach\u00a0\u00a0\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Scammers\u00a0use third-party ad distributors\u00a0such as\u00a0Google\u00a0Ads\u00a0(AdWords),\u00a0AdPlugg, Propeller Ads, etc.\u00a0to display their ads on legitimate sites.\u00a0These third-party advertising\u00a0platforms have huge networks\u00a0of\u00a0companies that want to publish advertisements and website owners (publishers) that want to\u00a0earn income from\u00a0displaying\u00a0ads.\u00a0VentureBeat reports that\u00a0Google delivers\u00a0<a href=\"https:\/\/venturebeat.com\/2012\/10\/25\/30-billion-times-a-day-google-runs-an-ad-13-million-times-it-works\/#:~:text=30%20billion%20ads%20served%20%E2%80%A6%20a%20day&amp;text=Between%20ads%20on%20its%20own,That's%20mind%2Dboggling.\" target=\"_blank\" rel=\"noreferrer noopener\">30 billion<\/a>\u00a0ads\u00a0every day, and no one is going to\u00a0scrutinize each code in those ads.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Just like any other advertiser, the perpetrator also\u00a0makes\u00a0a\u00a0free account on such sites, creates\u00a0some\u00a0malware-loaded\u00a0advertisements, bids\u00a0for the keywords, and\u00a0specifies\u00a0the\u00a0daily budget\u00a0and the target audience. The ad distributors\u00a0display the ads as per web visitors&#8217; browsing behavior on their large pool of network websites (including highly reputed ones).\u00a0This is how the attackers manage to post their ads on the reputed sites.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In some cases, cybercriminals will steal legitimate advertisements from big name companies. But instead of linking back to those legitimate organizations, they\u2019ll instead link to their malicious websites.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>2. Rent Space Directly to Display Malvertising\u00a0\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Some website owners\u00a0(social media platforms, popular blogs, video streaming platforms, etc.)\u00a0offer\u00a0spaces\u00a0on their websites\u00a0directly to advertisers as rentals. They may opt to do this\u00a0instead of being part of\u00a0third-party ad distributor networks\u00a0to generate extra income.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Advertisers\u00a0display\u00a0many of the following on rented spaces:\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Ad\u00a0banners,\u00a0\u00a0<\/li>\n<li>Videos,\u00a0\u00a0<\/li>\n<li>In-line\u00a0text\u00a0ads, or\u00a0\u00a0<\/li>\n<li>Even sponsored\u00a0articles.\u00a0\u00a0<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Some discussion forums like Quora\u00a0and\u00a0Reddit\u00a0allow advertisements\u00a0to post\u00a0in\u00a0Q&amp;A format.\u00a0They charge fees as per the impression counts, the number of clicks, percentage of the sale, or as per the time slot\u00a0like\u00a0weekly, bi-weekly,\u00a0or\u00a0monthly.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Attackers\u00a0generally\u00a0put\u00a0benign\u00a0ads in the initial phase, and after gaining the trust of the\u00a0host\u00a0platform, they start adding malware in the ads.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>3. Take Advantage of Vulnerabilities on Host Platforms\u00a0\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Some hackers exploit websites\u00a0with weak security postures\u00a0by\u00a0manipulating them to display\u00a0their\u00a0malvertisements. In this method, the\u00a0affected\u00a0website owners\u00a0have\u00a0no clue that their websites\u00a0are\u00a0showing such ads, and they don\u2019t receive any money for such ads.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>Examples of How Malvertising Works<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>You might be wondering, what exactly is going to happen if you click on a\u00a0malvertisement? Let\u2019s explore how attackers can defraud you\u00a0with\u00a0malvertising\u00a0examples and hypothetical\u00a0examples.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Hackers\u00a0Use\u00a0Malvertising\u00a0as a\u00a0Malware Delivery System\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/different-types-of-malware\/\">common types of malware<\/a>\u00a0that can be spread through\u00a0malvertisements\u00a0include\u00a0viruses, worms,\u00a0trojans,\u00a0and\u00a0root-kits.\u00a0The infected advertisements\u00a0insert\u00a0these\u00a0malicious codes or software onto\u00a0website visitors&#8217; devices\u00a0to\u00a0execute various cyber-attacks against them.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4><em>Example 1:\u00a0Malvertising\u00a0Causes\u00a0Users\u00a0to Unknowingly Download Computer Viruses\u00a0<\/em>\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Bob\u00a0wants\u00a0to buy a\u00a0new\u00a0cell phone and\u00a0is\u00a0browsing\u00a0online\u00a0for a\u00a0good online deal.\u00a0He sees\u00a0an ad\u00a0stating,\u00a0&#8220;40% discount on any\u00a0Samsung\u00a0phone!&#8221;\u00a0on a deal-sharing website. He\u00a0gets\u00a0excited\u00a0and clicks\u00a0on the ad, which\u00a0takes\u00a0him to a genuine-looking ecommerce site.\u00a0When the page loads, it displays a message saying,\u00a0&#8220;Sorry, we are out of stock.&#8221;\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Disappointed, Bob closes\u00a0the tab and continues\u00a0searching for a good mobile\u00a0discount. But\u00a0what\u00a0Bob\u00a0doesn\u2019t know is that he isn\u2019t\u00a0returning\u00a0entirely\u00a0empty-handed. When he clicked on the advertisement,\u00a0he inadvertently downloaded a\u00a0dangerous virus on his device. This nasty little number\u00a0soon\u00a0crashes\u00a0his\u00a0entire system\u00a0and steals\u00a0all\u00a0of\u00a0his personal data!\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4><em>Example 2: Hackers Trick Users\u00a0<\/em><em>in<\/em><em>to Download<\/em><em>ing Trojans<\/em><em>\u00a0via\u00a0<\/em><em>Malvertising<\/em><em>\u00a0<\/em>\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Alice\u00a0is\u00a0scrolling her social media profile when\u00a0she sees\u00a0an ad\u00a0with clips of\u00a0an interesting\u00a0computer\u00a0game. Since she\u2019s\u00a0bored, she clicks\u00a0on the ad to play it. She\u00a0sees an\u00a0error message\u00a0stating\u00a0that the game will run only on the latest\u00a0Flash\u00a0Media\u00a0Player. The message also\u00a0includes\u00a0a link to install the latest\u00a0Flash player. So, Alice clicks\u00a0on the given link and follows\u00a0all the steps to install it on her PC.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>What Alice doesn\u2019t know is that it was a\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-trojan-horse-in-computer-terms\/\">trojan<\/a>\u00a0impersonating\u00a0the\u00a0media player.\u00a0A trojan\u00a0is a type of\u00a0malicious software\u00a0that cybercriminals\u00a0disguise to look like a legitimate computer program, application, or file\u00a0to\u00a0trick the users into downloading it.\u00a0Unknowingly, she has\u00a0just\u00a0installed and activated a trojan malware that can steal all her data, lock the files, and hijack the entire system.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>See how\u00a0a\u00a0trojan looks like in real life in the below screenshot. You think you are downloading a Flash player, but when you check the developer\/publisher&#8217;s name, you can see that it&#8217;s not coming from Adobe but some scam artist.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:html --><\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"646\" height=\"390\" class=\"wp-image-1581 addshadow\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-6.png\" alt=\"An example of a malvertisement that tries to look like a Flash Media Player  download\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-6.png 646w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-6-300x181.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/image-6-560x338.png 560w\" sizes=\"auto, (max-width: 646px) 100vw, 646px\" \/>\n<p>\u00a0<\/p>\n<figcaption>Image Source:\u00a0<a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/19\/j\/new-fileless-botnet-novter-distributed-by-kovcoreg-malvertising-campaign.html\" target=\"_blank\" rel=\"noreferrer noopener\">trendmicro.com<\/a>\u00a0<\/figcaption>\n<\/figure>\n<\/div>\n<p><!-- \/wp:html --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Malvertising\u00a0Leads Users to Phishing Sites\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In the\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/common-types-of-phishing-attacks-how-to-recognize-avoid-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing attacks<\/a>, the attacker impersonates a legit entity or the person to defraud the users. Phishing can be done via\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/what-is-a-phishing-email-5-examples-of-phishing-emails-and-how-to-avoid-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">emails<\/a>, phone calls,\u00a0<a href=\"https:\/\/sectigostore.com\/blog\/what-is-sms-spoofing-how-can-you-prevent-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">SMS<\/a>, Wi-Fi\u00a0routers, websites, etc.\u00a0Malvertisements\u00a0redirect the users to\u00a0phishing websites\u00a0that look like replicas\u00a0of well-known, legitimate\u00a0sites. These\u00a0phishing websites\u00a0can make\u00a0users\u00a0download and install malicious applications or steal users&#8217; personal\/financial information.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4><em>Example of\u00a0<\/em><em>H<\/em><em>ow\u00a0<\/em><em>M<\/em><em>alvertisements\u00a0<\/em><em>M<\/em><em>ake<\/em><em>\u00a0Users Victims of Phishing Attacks<\/em><em>\u00a0<\/em>\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>John was reading an interesting article online when he\u00a0sees\u00a0an advertisement\u00a0mentioning that Macy&#8217;s has introduced a new store-credit card which will give a 20% discount on all the shopping done from their outlets. John\u00a0is\u00a0Macy&#8217;s regular\u00a0customer, so he obviously wants to take advantage of this\u00a0deal. He\u00a0clicks\u00a0on the ad, lands\u00a0on\u00a0what he believes to be the\u00a0Macy&#8217;s\u00a0website,\u00a0and fills\u00a0out a form to replace his current store credit\u00a0card.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>After submitting the form, John\u00a0also\u00a0receives\u00a0the message that\u00a0Macy\u2019s will send his\u00a0new card\u00a0soon\u00a0to\u00a0his residence. What John doesn\u2019t know is that website he filled out the form was a phishing website that looked exactly like Macy&#8217;s original site. And\u00a0instead of Macy\u2019s, the hackers have received\u00a0all the information he has filled out (name, email address, phone number, physical address, existing credit card details), and\u00a0they will make him a victim\u00a0of identity theft or financial fraud\u00a0pretty soon!\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Mavertisements\u00a0Spread\u00a0\u201cDrive-by\u201d\u00a0Malware\u00a0\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Some types of\u00a0malvertisements\u00a0automatically\u00a0download\u00a0the malware\u00a0onto\u00a0website visitors\u2019 devices, even if they haven\u2019t\u00a0click on anything\u00a0or\u00a0press the download\u00a0button.\u00a0This type of malware is known as\u00a0<a href=\"https:\/\/securityintelligence.com\/how-to-defend-against-malvertising-drive-by-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">drive-by malware<\/a>\u00a0because it doesn\u2019t require any actions from the users and auto downloads.\u00a0Drive-by malware can spread in many ways, and\u00a0malvertising\u00a0is one of them.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>It is quite difficult to\u00a0insert the drive-by malware\u00a0into a clean and reputed site. So, the attackers rent advertisement space and insert the drive-by malware in the ads.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4><em>Example of\u00a0<\/em><em>How\u00a0<\/em><em>Malvertisements\u00a0Deliver Drive-by Malware<\/em>\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Todd runs a successful traveling blog, which attracts more than a million website visitors every year. Todd\u00a0was\u00a0shocked\u00a0to receive\u00a0an angry email stating, &#8220;STOP SPREADING VIRUSES!&#8221;\u00a0But it didn\u2019t stop with one email. Within 24 hours, he received more than\u00a030 such\u00a0furious\u00a0emails complaining about \u201csuspicious software downloads\u201d when people visited\u00a0his website.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>He anxiously thought,\u00a0<em>\u201cHow come I spread malware when I don\u2019t know a single line of coding or anything about hacking? I just write my blog content\u00a0<\/em><em>on<\/em><em>\u00a0a simple WordPress platform.\u201d<\/em>\u00a0\u00a0\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>What Todd doesn\u2019t know is that the person who is paying him a $100\u00a0a\u00a0month to publish\u00a0a\u00a0hotel\u2019s advertisement on his\u00a0blog is a hacker\u00a0and the real culprit behind all this mess. He has inserted\u00a0the\u00a0drive-by malware in the blog via advertisements. Whenever a website visitor visits Todd&#8217;s blog, they inadvertently\u00a0download the\u00a0drive-by malware in their devices.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>The people who are complaining are the lucky ones whose security software could alert them about\u00a0such malware\u00a0insertion. But the rest of\u00a0the unfortunate\u00a0website visitors\u00a0are not even aware of such\u00a0download\u00a0and\u00a0have become victims\u00a0of the drive-by <a class=\"wpil_keyword_link\" title=\"malware attack\" href=\"https:\/\/sectigostore.com\/blog\/malware-attack-different-types-of-malware-attacks\/\">malware attack<\/a>.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Hackers Use\u00a0Malvertising\u00a0to Distribute Exploit Kits\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-an-exploit-kit\" target=\"_blank\" rel=\"noreferrer noopener\">An exploit kit<\/a>\u00a0is an instrument to exploit the vulnerabilities of a software or application. Software vulnerability means errors or bugs in the software, which\u00a0hackers can use as loopholes to insert malware into\u00a0victims\u2019\u00a0systems. Exploit kits\u00a0contain\u00a0special codes that can scan the connected host&#8217;s systems, find the vulnerabilities, and deliver the payload as per the vulnerability type. Sometimes attackers use\u00a0malvertisements\u00a0to distribute exploit kits.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":4} --><\/p>\n<h4><em>Example of How Malware Trick Victims\u00a0<\/em><em>in<\/em><em>to Download<\/em><em>ing<\/em><em>\u00a0Exploit Kit<\/em><em>s<\/em><em>\u00a0<\/em>\u00a0<\/h4>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Eva was watching a video online when an ad caught her attention, stating,\u00a0<em>\u201cIs your device is getting slow?\u00a0<\/em><em>It might be due to virus infection<\/em><em>! Scan your device for FREE today!\u201d<\/em>\u00a0Eva immediately clicked on that ad because she was frustrated with her painstakingly slow laptop. As\u00a0the ad promised, the free antivirus program started to scan her laptop\u00a0right away without charging a single penny!\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>What Eva doesn\u2019t know is that\u00a0the security\u00a0software\u00a0is an exploit\u00a0kit\u00a0that is also scanning all the applications she has installed and\u00a0finding\u00a0vulnerabilities in them. After finding\u00a0various\u00a0vulnerabilities, the exploit\u00a0kit inserts\u00a0malware into some of her\u00a0applications, browsers, and software!\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>7\u00a0Malvertising\u00a0Protection Tips\u00a0<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>By now, you\u00a0likely have a better idea of what\u00a0malvertising\u00a0is and\u00a0how dangerous\u00a0it\u00a0can be.\u00a0Now, let\u2019s explore some basic ways to protect your device from\u00a0malvertisements.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Malvertising\u00a0Protection\u00a0Tips\u00a0for\u00a0Website\u00a0Visitors\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>1.\u00a0Use cybersecurity software to help identify threats:<\/strong>\u00a0Antivirus, antimalware, and anti-spyware software are going to be the first line of defense against\u00a0malvertising.\u00a0Some\u00a0programs\u00a0are signature-based, while others are behavior-based.\u00a0\u00a0If anything downloads to\u00a0your device,\u00a0these\u00a0programs\u00a0will alert you. Plus,\u00a0they\u00a0will scan all the downloads and installations and remove the\u00a0malware loaded stuff\u00a0from your device.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>2.\u00a0Manually check your systems to identify suspicious programs and files:\u00a0<\/strong>Manually check your download folder,\u00a0C:\/Program File,\u00a0C:\/Program Files (x86), and\u00a0C:\/Windows\/Temp\u00a0folders\u00a0for\u00a0any\u00a0unknown or suspicious\u00a0programs, files, and\u00a0software.\u00a0If you find an application that\u00a0you\u00a0didn\u2019t download,\u00a0you should do\u00a0some research\u00a0about it and its manufacturer\/developer online. This way, you\u00a0cano\u00a0ensure the program is legitimate.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>3.\u00a0Put ad-blocking software to use:\u00a0<\/strong>There\u00a0are some\u00a0<a href=\"https:\/\/www.tomsguide.com\/round-up\/best-adblockers-privacy-extensions\" target=\"_blank\" rel=\"noreferrer noopener\">adblocking software<\/a>\u00a0and browser extensions available in the market that successfully block the ads. They block all types of advertisements, whether they are harmless or malicious.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>4.\u00a0Keep your system patched with updated software:\u00a0<\/strong>Keep all your software components, applications, browsers, and operating system patched and updated to the latest version.\u00a0The old versions generally have security bugs that attackers can exploit to insert malware into\u00a0your\u00a0devices and IT\u00a0systems.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>5.\u00a0Be vigilant\u00a0while surfing online:\u00a0<\/strong>If you are redirected to a website,\u00a0carefully inspect the URL, and make sure you have arrived on the company&#8217;s official website.<strong>\u00a0<\/strong>If you\u2019re\u00a0unsure\u00a0whether\u00a0the company&#8217;s\u00a0web address is real\u00a0or find\u00a0product\u00a0prices, discounts,\u00a0or other information\u00a0suspicious or &#8220;too good to be true,&#8221;\u00a0conduct a separate\u00a0Google\u00a0search\u00a0about it.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>You can\u00a0also\u00a0click on the padlock sign in the address bar to check the website and organization\u2019s information\u00a0in\u00a0its SSL\/TLS certificate.\u00a0Of course, if the site isn\u2019t using one of these certificates, that should already be a red flag.\u00a0\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>6. Use official\u00a0resources\u00a0and websites (avoid downloading from third-party sites)<\/strong>:\u00a0Be sure to only download browser extensions, media players, or updated versions of any applications\u00a0from their official websites.\u00a0For example, if the game you\u2019re\u00a0trying to play online shows the message that it will run only on the latest version of Chrome, download the latest version of your browser only from\u00a0<a href=\"https:\/\/www.google.com\/chrome\/\" target=\"_blank\" rel=\"noreferrer noopener\">google.com\/chrome<\/a>.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>If you see a popup showing that your system is suffering from virus infection, instead of clicking on that ad, scan your device with your trusted\u00a0antivirus or\u00a0anti-malware software only.\u00a0\u00a0\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>Malvertising Protecetion Tips for Website Owners\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>7.\u00a0Use website scanners:\u00a0<\/strong>Use\u00a0legitimate\u00a0website scanners\u00a0that continuously monitor, scan, detect, and remove the malicious codes on your website.<strong>\u00a0<\/strong>So, if someone has inserted malware-laden advertisements, these types of scanners can quickly detect it before it&#8217;s too late.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Another good idea is to use a website vulnerability scanner tool such as\u00a0<a href=\"https:\/\/sectigostore.com\/website-security\/hacker-proof-trust-mark-vulnerability-scan\">HackerProof Trust Mark<\/a>.\u00a0It&#8217;s a site seal that\u00a0also runs daily vulnerability scans of your site and provides recommendations for remediation. So,\u00a0in addition to offering visual assurances of security to your customers and users, it also gives you actionable intelligence for how to improve the security of your site.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>8.\u00a0Restrict\u00a0ad file types:<\/strong>\u00a0Restrict ads to\u00a0allow\u00a0only specific files types\u00a0to display. Also be sure to\u00a0disallow the use of any code, including\u00a0Javascript.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><strong>9.\u00a0Install the updates\u00a0as soon as they are available<\/strong>: Keep all plugins, themes, and applications updated to their latest versions so that no one can break into your website and insert the\u00a0malvertisements.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading {\"level\":3} --><\/p>\n<h3>The Difference Between\u00a0Malvertising\u00a0and Adware\u00a0<\/h3>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>People use the\u00a0terms\u00a0\u201cmalvertising\u201d\u00a0and\u00a0\u201cadware\u201d\u00a0interchangeably, but\u00a0both\u00a0words\u00a0have different meanings.\u00a0Malvertising\u00a0refers to ads that deliver\u00a0malware, whereas\u00a0adware\u00a0is\u00a0malware that pushes ads that are often\u00a0harmless\u00a0(albeit annoying).\u00a0Basically, adware is an advertisement-generating software that keeps showing you unwanted advertisements\u00a0that link to spammy websites.\u00a0It is important to note, however, that these ads can sometimes be\u00a0dangerous in that they may link to malicious websites.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Did you know that publishing software that bundles adware\u00a0with\u00a0it\u00a0can\u00a0actually\u00a0legal\u00a0in some cases\u00a0(though not all)?\u00a0This allows organizations to\u00a0track users&#8217; geographical locations and display ads accordingly\u00a0based on that data. This is a way\u00a0to generate pay-per-click (PPC)\u00a0or pay-per-view (PPV)\u00a0revenue for software developers. However, adware\u00a0becomes\u00a0illegal when it\u00a0crosses certain lines, such as:\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<ul>\n<li>Displaying\u00a0popup\u00a0ads\u00a0in\u00a0windows\u00a0you can\u2019t close or exit,\u00a0\u00a0<\/li>\n<li>Delivering\u00a0malware,\u00a0<\/li>\n<li>Tracking\u00a0your\u00a0actions\u00a0or behaviors, and\u00a0<\/li>\n<li>Stealing\u00a0data such as users&#8217; personal information or login credentials.\u00a0<\/li>\n<\/ul>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Of course, if you\u2019re not sure whether any adware you wish to use is legal or illegal, it\u2019s best to consult a legal professional\u00a0who specializes\u00a0in these matters.\u00a0(We don\u2019t offer legal advice here.)\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>While users encounter\u00a0malvertisments\u00a0only while visiting affected websites, adware is stored inside the user&#8217;s browser or the device itself. Hence, adware shows you unsolicited advertisements on your device&#8217;s home screen, even if you aren\u2019t\u00a0visiting any website.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>It becomes difficult for anti-malware software to spot\u00a0malvertisements\u00a0because they are on legit sites. But security software can easily detect and remove adware, which is sometimes detected under the name of the potentially unwanted program (PUP).\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In short,\u00a0malvertisements\u00a0are way more dangerous and harmful than adware.\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:heading --><\/p>\n<h2>Wrapping\u00a0Up on\u00a0Malvertising\u00a0\u00a0<\/h2>\n<p><!-- \/wp:heading --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>In general, we <a href=\"https:\/\/sectigostore.com\/blog\/how-to-tell-if-a-website-is-legit-in-10-easy-steps\/\">tell people to\u00a0avoid malicious websites<\/a> and\u00a0not\u00a0download anything that looks fishy. But in\u00a0malvertising, the host websites are trustworthy, and the ad content\u00a0frequently appears\u00a0harmless. Hence\u00a0why\u00a0even the vigilant people become prey to such attacks.\u00a0That&#8217;s why robust security software is the\u00a0best way to alert you when you are downloading any infected material from online.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p>Updating all\u00a0of your\u00a0software components and using ad-blocking software can also be quite helpful.\u00a0If you\u00a0receive\u00a0any malware-related complaints from your website visitors, take\u00a0their concerns\u00a0seriously, and scan all\u00a0of\u00a0your ads. If you\u2019re\u00a0using third-party ad platforms, contact them immediately\u00a0to\u00a0report the issue.\u00a0\u00a0<\/p>\n<p><!-- \/wp:paragraph --><\/p>","protected":false},"excerpt":{"rendered":"<p>Explore how to recognize a malvertisement and protect yourself from getting hacked &nbsp;&nbsp;&nbsp; Malvertising&nbsp;= malicious advertising. Basically, it\u2019s&nbsp;a&nbsp;way for cybercriminals to spread&nbsp;malware&nbsp;(malicious software)&nbsp;through ad displays on websites and apps.&nbsp;Malware means&#8230;<\/p>\n","protected":false},"author":6,"featured_media":1589,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":1,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[13,1],"tags":[137],"class_list":["post-1578","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-web-security","tag-malvertising","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Malvertising? Explore 6 Real-Life Examples &amp; Protection Tips<\/title>\n<meta name=\"description\" content=\"Malvertising is a threat to websites &amp; users alike. Discover what malvertisements are, how they work, and get malvertising protection tips...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Malvertising? Explore 6 Real-Life Examples &amp; Protection Tips\" \/>\n<meta property=\"og:description\" content=\"Malvertising is a threat to websites &amp; users alike. Discover what malvertisements are, how they work, and get malvertising protection tips...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-30T15:47:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-28T14:08:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/malvertising-example-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Medha Mehta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Medha Mehta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/\"},\"author\":{\"name\":\"Medha Mehta\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"headline\":\"What is Malvertising? Explore 6 Real-Life Examples &#038; Protection Tips\",\"datePublished\":\"2020-09-30T15:47:32+00:00\",\"dateModified\":\"2020-12-28T14:08:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/\"},\"wordCount\":3384,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malvertising-example-feature.jpg\",\"keywords\":[\"malvertising\"],\"articleSection\":[\"Cyber Security\",\"Web Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/\",\"name\":\"What is Malvertising? Explore 6 Real-Life Examples & Protection Tips\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malvertising-example-feature.jpg\",\"datePublished\":\"2020-09-30T15:47:32+00:00\",\"dateModified\":\"2020-12-28T14:08:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\"},\"description\":\"Malvertising is a threat to websites & users alike. Discover what malvertisements are, how they work, and get malvertising protection tips...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malvertising-example-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/malvertising-example-feature.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"Hand typing discount coupon code on smartphone screen to get the shopping on line sale promotion, on line shopping ,digital marketing business and technology, lifestyle concept\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-malvertising-examples-and-protection-tips\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Malvertising? Explore 6 Real-Life Examples &#038; Protection Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/41d095943b7798ade1bc3683c8822f15\",\"name\":\"Medha Mehta\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g\",\"caption\":\"Medha Mehta\"},\"description\":\"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.\",\"sameAs\":[\"https:\\\/\\\/sectigostore.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Malvertising? Explore 6 Real-Life Examples & Protection Tips","description":"Malvertising is a threat to websites & users alike. Discover what malvertisements are, how they work, and get malvertising protection tips...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/","og_locale":"en_US","og_type":"article","og_title":"What is Malvertising? Explore 6 Real-Life Examples & Protection Tips","og_description":"Malvertising is a threat to websites & users alike. Discover what malvertisements are, how they work, and get malvertising protection tips...","og_url":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/","og_site_name":"InfoSec Insights","article_published_time":"2020-09-30T15:47:32+00:00","article_modified_time":"2020-12-28T14:08:13+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/malvertising-example-feature.jpg","type":"image\/jpeg"}],"author":"Medha Mehta","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Medha Mehta","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/"},"author":{"name":"Medha Mehta","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"headline":"What is Malvertising? Explore 6 Real-Life Examples &#038; Protection Tips","datePublished":"2020-09-30T15:47:32+00:00","dateModified":"2020-12-28T14:08:13+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/"},"wordCount":3384,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/malvertising-example-feature.jpg","keywords":["malvertising"],"articleSection":["Cyber Security","Web Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/","url":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/","name":"What is Malvertising? Explore 6 Real-Life Examples & Protection Tips","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/malvertising-example-feature.jpg","datePublished":"2020-09-30T15:47:32+00:00","dateModified":"2020-12-28T14:08:13+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15"},"description":"Malvertising is a threat to websites & users alike. Discover what malvertisements are, how they work, and get malvertising protection tips...","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/malvertising-example-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2020\/09\/malvertising-example-feature.jpg","width":1600,"height":1000,"caption":"Hand typing discount coupon code on smartphone screen to get the shopping on line sale promotion, on line shopping ,digital marketing business and technology, lifestyle concept"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-malvertising-examples-and-protection-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Malvertising? Explore 6 Real-Life Examples &#038; Protection Tips"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/41d095943b7798ade1bc3683c8822f15","name":"Medha Mehta","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a1e5b5025e87d4e1acfd683fbede8c366e652e9ddb2164b7a0d0a77e2d9da727?s=96&d=mm&r=g","caption":"Medha Mehta"},"description":"Medha is a regular contributor to InfoSec Insights. She's a tech enthusiast and writes about technology, website security, cryptography, cyber security, and data protection.","sameAs":["https:\/\/sectigostore.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=1578"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/1578\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/1589"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=1578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=1578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=1578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}