Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Advertising. Show all posts

Why Trust Drives the Future of Cybersecurity Marketing

 




With the changing nature of threats in cyberspace becoming sharper by the day, business houses are seen as shy about entrusting their precious data to the cybersecurity firm of choice. Shallow, flashy, and blanket marketing tactics that worked a few years ago are increasingly losing their impact. It is against this backdrop that demand for trust-based marketing continues to increase within the precincts of the cybersecurity industry.


Role of Trust in Cybersecurity Marketing

Unlike manufactured goods, cybersecurity services offer safety and security. It is the customers-again, usually major decision-makers like CISOs or CTOs, though-with their wallets, on companies that demonstrate real acumen and trustworthiness. More specifically, as threats increasingly complicated nature, those companies need to be perceived as forward-thinking in terms of embracing and addressing new threats.


Tacky ad campaigns and blanket marketing initiatives will have a hard time breaking into the space needed to develop that feel of trust. Cybersecurity customers will respond less to bright colours and more to the content marketing strategy: one that focuses on distributing utility-laden articles, case studies, webinars, and other materials that can inform.


This strategy enables companies to reach maturity with credibility as a thought leader, comforting clients that they are one step ahead of cyber threats.


Flaws of the Old Advertising Model

Traditional advertising is, therefore, ineffective for many in cybersecurity. Ads are saturated, and the "fatigue" caused by overexposure leads potential clients to dismiss or simply ignore them. Added to increasing scepticism surrounding inflated or erroneous advertisements, especially within cybersecurity, can cause damage. Customers want to see authentic, transparent marketing approaches. Approaches that are not authentic fall short within an industry where trust is paramount.


In response to the above issues, many firms now rely extensively on recommendations from key industry personalities. Here is where influencer marketing comes in as one of the most effective ways through which brands can reach customers based on authentic and knowledgeable voices.


Industry Experts Influence

Those authentic influencers in cybersecurity will bring a specific value by discussing insights with followers who trust their words already. Companies engaged in cybersecurity will then have the chance to reach the stakeholders when they team up with such influencers. This is how they come into audiences that are more open to the knowledge of solutions that the company has. These influencers can help dilute complex information, which may make it accessible to a client and, consequently, reinforce the authority of that brand in the field.


Challenges of Choosing the Correct Influencers

It is even more challenging than in other sectors to select the right influencer because the industry demands very high expertise and credibility. In identifying influencers, companies need to consider those whose audiences are high-level decision-makers with a real interest in cybersecurity solutions. The number of followers is irrelevant; reputation and history of creating relevant, correct content are critical. Misaligned partnerships waste resources, but more importantly, they can affect the reputation of the brand if the influencer lacks credibility.


Simplify this: many companies use influencer marketing platforms. They vet influencers, understand engagement metrics, and help companies reach the right influencers-that is, reach CISOs, CTOs, or other key decision-makers.


Technology for Influencer Marketing Optimization 

For instance, there is Presspool.ai that offers platforms whereby the companies in cybersecurity can connect with verified influencers. Through data-driven insights for effective engagement, it works on spotting effective influencer partnerships, which then these systems identify influencers who have audiences that benefit the brand's objectives when using them based on an analysis of engagement data.


This data-driven approach helps firms track the performance of each campaign in real-time. Conversion and engagement levels evaluate the performance of every campaign, thereby enabling companies to target with maximum effect and guarantee a high return on investment. These insights make influencer marketing efficient and scalable.


Influencer Marketing: The Future Focus for Cybersecurity

With careful usage, influencer marketing creates great benefits for cybersecurity businesses. It brings them closer to the most intent clients-by those who are looking for cybersecurity-through a trusted voice. Here's an example; if a highly respected influencer supports a product then his followers will look and consider the solution much more seriously because it has been reviewed by a respected voice.


Additionally, these influencers teach potential clients the deconstructed version of complicated cybersecurity concepts and facilitate building credibility toward the brand as a thought leader. Not only will this create trust but also will make the clients perceive the company as an industry leader committed to the ongoing advancement of cybersecurity.


Authenticity and Analytics Are the Keys

This is a world of cyber security and a traditional ad won't work and the clients look for real voices. Here, influencer marketing can fill the gap so that a company may establish meaningful relationships through the voice of trusted figures as it changes their approach of establishing credibility in the field.

Influencer marketing platforms, through real-time data, will make these partnerships measurable and adaptable to a trust-based marketing approach rather than an ad-centric approach. Trust is now the bed on which influencer marketing will play a major role in shaping cybersecurity marketing for the future.


FTC Report Exposes Mass Data Surveillance by Some of the Social Media Giants in the World



According to a new report published by the Federal Trade Commission (FTC), it was found that Facebook - that has since become Meta, YouTube, WhatsApp, and others - have been highly involved in mass surveillance practices while banking in billions of dollars. The investigation, which began from December 2020, exposed the scale of these platforms' collection, monetization, and exploitation of personal information belonging to users.

The FTC's 129-page report exposed how such companies, including Amazon's Twitch, Reddit, Twitter (now X), and TikTok's ByteDance, accumulate vast loads of personal data. This data, mainly collected by these services without the full awareness of users, becomes the foundation of many profitable business models-as is often the case with paid-for targeted advertising. Meta reported that 98% of its second-quarter revenue of $39.07 billion came from ads on Facebook and Instagram, which rely on data harvested from users.

Data Collection Beyond Expectation 

What perhaps really scarring is the number of data and how that's amassed. Companies pay for more information from third-party brokers, which includes income levels, location data, and personal interests of users, to create profiles of online behaviour. Such data is used to fine-tune targeted ads while upgrading profitability, yet users are largely unaware of the extent of all these practices.

Lack of User Control

Despite all that is collected, the report comes to the following conclusion: users have little control over what is done with their personal information. Of course, people are informed that their data is used to deliver targeted advertising and recommendations, but they do not have meaningful tools to direct or limit that use. In most cases, even after user requests to delete all of their information, platforms retain at least de-identified data, or cannot remove all traces of personal information.

Recommendations of FTC for Transparency

The report was a call to these organisations to be open and tell people just what data is being collected and what the data is going to be used for, so consumers have some stake in their information. The FTC also recommended stronger federal legislation of privacy to restrict surveillance and place more control in consumer's hands about data.

The results of such probes have therefore led to several debates on privacy and regulations that protect those users in a modern digital world where the personal information of users is simultaneously tracked and monetized. The FTC report further emphasised the need for companies to be more transparent in adopting practices that offer safeguards regarding user privacy.

Supreme Court Directive Mandates Self-Declaration Certificates for Advertisements

 

In a landmark ruling, the Supreme Court of India recently directed every advertiser and advertising agency to submit a self-declaration certificate confirming that their advertisements do not make misleading claims and comply with all relevant regulatory guidelines before broadcasting or publishing. This directive stems from the case of Indian Medical Association vs Union of India. 

To enforce this directive, the Ministry of Information and Broadcasting has issued comprehensive guidelines outlining the procedure for obtaining these certificates, which became mandatory from June 18, 2024, onwards. This move is expected to significantly impact advertisers, especially those using deepfakes generated by Generative AI (GenAI) on social media platforms like Instagram, Facebook, and YouTube. The use of deepfakes in advertisements has been a growing concern. 

In a previous op-ed titled “Urgently needed: A law to protect consumers from deepfake ads,” the rising menace of deepfake ads making misleading or fraudulent claims was highlighted, emphasizing the adverse effects on consumer rights and public figures. A survey conducted by McAfee revealed that 75% of Indians encountered deepfake content, with 38% falling victim to deepfake scams, and 18% directly affected by such fraudulent schemes. Alarmingly, 57% of those targeted mistook celebrity deepfakes for genuine content. The new guidelines aim to address these issues by requiring advertisers to provide bona fide details and final versions of advertisements to support their declarations. This measure is expected to aid in identifying and locating advertisers, thus facilitating tracking once complaints are filed. 

Additionally, it empowers courts to impose substantial fines on offenders. Despite the potential benefits, industry bodies such as the Indian Internet and Mobile Association of India (IAMAI), Indian Newspaper Association (INS), and the Indian Society of Advertisers (ISA) have expressed concerns over the additional compliance burden, particularly for smaller advertisers. These bodies argue that while self-certification has merit, the process needs to be streamlined to avoid hampering legitimate advertising activities. The challenge of regulating AI-enabled deepfake ads is further complicated by the sheer volume of digital advertisements, making it difficult for regulators to review each one. 

Therefore, it is suggested that online platforms be obligated to filter out deepfake ads, leveraging their technology and resources for efficient detection. The Ministry of Electronics and Information Technology highlighted the negligence of social media intermediaries in fulfilling their due diligence obligations under the IT Rules in a March 2024 advisory. 

Although non-binding, the advisory stipulates that intermediaries must not allow unlawful content on their platforms. The Supreme Court is set to hear the matter again on July 9, 2024, when industry bodies are expected to present their views on the new guidelines. This intervention could address the shortcomings of current regulatory approaches and set a precedent for robust measures against deceptive advertising practices. 

As the country grapples with the growing threat of dark patterns in online ads, the apex court’s involvement is crucial in ensuring consumer protection and the integrity of advertising practices in India.

AI in Sounds is Helping Brands Create Their ‘Sonic Identity’


It is now well acknowledged that in the present era, individuals are constantly exposed to fast-moving imagery, be it through social media videos or digital billboards in public places. 

However, Michele Arnese, an advertising entrepreneur believes there has been a similar surge in ‘sounds.’ According to him, brands can only be complete with the help of AI. 

According to Arnese, "More and more the sound of a brand is like liquid[…] It goes everywhere and takes its shape according to the customer experience."

In 2009, Arnese founded the AI-based music company – Amp – based in Munich. The company (now acquired by Landor&Fitch, a WWP advertising subsidiary) uses AI to create a wide range of sounds for businesses, from brief noise bursts when an app launches to extended compositions for things like podcasts and social media videos. The "sonic identity" of a brand is what he refers to as this.

Nowadays, AI has been exemplifying its capabilities, like reimagining films, creating music using the voices of artists, developing architectural drawings and much more. Thus, its significance in the world of advertising is also evident. 

What can AI do for Sound in ‘Advertising’? 

Arnese confirmed that humans have an important role in the company’s process. For instance, his in-house composers create a track called “Sonic DNA” of the brand, that lasts for around 90 seconds. 

The initial task of AI is to ensure that these noises are distinct from those already employed by other businesses. Machine learning can also determine the impact and memorability of the music's trademark patterns.

Arnese argues that once this DNA is formed, the primary function of AI is to enable businesses to produce music on an industrial scale in order to meet the demands of digital channels.

Moreover, AI can produce infinite remixes of music from the provided DNA, serving varied tempos, moods and durations. Also, AI has become an easier and cheaper option for music enthusiasts, than buying individual pieces of music for the thousands of scenarios. 

Arnese says, "These days no brand is on mute[…]Some brands upload a hundred videos to YouTube every week, and we asked ourselves, how can they afford it?"

However, scepticism still lurks in regard to the use of AI being a ‘game-changer’ for the advertising industry. 

Molly Innes from Marketing Week warns that "People put a lot of money into things like the Metaverse, crypto and NFTs, all the things marketers got excited about, and now they've had to backtrack."

She says that many people in the advertising industry are now taking a ‘wait-and-see’ approach to AI, especially because of the lack of money to invest in it. 

Arnese is adamant in his belief that AI will have a significant impact on advertising. He is also against the notion that there will be several job losses due to AI. 

"AI is just another tool to do your job," he says.

"It presents an opportunity to be inspired by something unexpected [that the computer generates] in the creative process, that's how I use it.”

He says, "Ten years ago there was no such job as data scientist in the advertising industry, can you imagine? But now it is part of the normal team set up of an agency.”

"AI is here to stay, but it's not a replacement for humans."  

Vietnamese Cybercriminals Exploit Malvertising to Target Facebook Business Accounts

Cybercriminals associated with the Vietnamese cybercrime ecosystem are exploiting social media platforms, including Meta-owned Facebook, as a means to distribute malware. 

According to Mohammad Kazem Hassan Nejad, a researcher from WithSecure, malicious actors have been utilizing deceptive ads to target victims with various scams and malvertising schemes. This tactic has become even more lucrative with businesses increasingly using social media for advertising, providing attackers with a new type of attack vector – hijacking business accounts.

Over the past year, cyber attacks against Meta Business and Facebook accounts have gained popularity, primarily driven by activity clusters like Ducktail and NodeStealer, known for targeting businesses and individuals operating on Facebook. 

Social engineering plays a crucial role in gaining unauthorized access to user accounts, with victims being approached through platforms such as Facebook, LinkedIn, WhatsApp, and freelance job portals like Upwork. Search engine poisoning is another method employed to promote fake software, including CapCut, Notepad++, OpenAI ChatGPT, Google Bard, and Meta Threads.

Common tactics among these cybercrime groups include the misuse of URL shorteners, the use of Telegram for command-and-control (C2), and legitimate cloud services like Trello, Discord, Dropbox, iCloud, OneDrive, and Mediafire to host malicious payloads.

Ducktail, for instance, employs lures related to branding and marketing projects to infiltrate individuals and businesses on Meta's Business platform. In recent attacks, job and recruitment-related themes have been used to activate infections. 

Potential targets are directed to fraudulent job postings on platforms like Upwork and Freelancer through Facebook ads or LinkedIn InMail. These postings contain links to compromised job description files hosted on cloud storage providers, leading to the deployment of the Ducktail stealer malware.

The Ducktail malware is designed to steal saved session cookies from browsers, with specific code tailored to take over Facebook business accounts. These compromised accounts are sold on underground marketplaces, fetching prices ranging from $15 to $340.

Recent attack sequences observed between February and March 2023 involve the use of shortcut and PowerShell files to download and launch the final malware. The malware has evolved to harvest personal information from various platforms, including X (formerly Twitter), TikTok Business, and Google Ads. It also uses stolen Facebook session cookies to create fraudulent ads and gain elevated privileges.

One of the primary methods used to take over a victim's compromised account involves adding the attacker's email address, changing the password, and locking the victim out of their Facebook account.

The malware has incorporated new features, such as using RestartManager (RM) to kill processes that lock browser databases, a technique commonly found in ransomware. Additionally, the final payload is obfuscated using a loader to dynamically decrypt and execute it, making analysis and detection more challenging.

To hinder analysis efforts, the threat actors use uniquely generated assembly names and rely on SmartAssembly, bloating, and compression to obfuscate the malware.

Researchers from Zscaler also observed instances where the threat actors initiated contact using compromised LinkedIn accounts belonging to users in the digital marketing field, leveraging the authenticity of these accounts to aid in social engineering tactics. This highlights the worm-like propagation of Ducktail, where stolen LinkedIn credentials and cookies are used to log in to victims' accounts and expand their reach.

Ducktail is just one of many Vietnamese threat actors employing shared tools and tactics for fraudulent schemes. A Ducktail copycat known as Duckport, which emerged in late March 2023, engages in information stealing and Meta Business account hijacking. Notably, Duckport differs from Ducktail in terms of Telegram channels used for command and control, source code implementation, and distribution, making them distinct threats.

Duckport employs a unique technique of sending victims links to branded sites related to the impersonated brand or company, redirecting them to download malicious archives from file hosting services. Unlike Ducktail, Duckport replaces Telegram as a channel for passing commands to victims' machines and incorporates additional information stealing and account hijacking capabilities, along with taking screenshots and abusing online note-taking services as part of its command and control chain.

"The Vietnamese-centric element of these threats and high degree of overlaps in terms of capabilities, infrastructure, and victimology suggests active working relationships between various threat actors, shared tooling and TTPs across these threat groups, or a fractured and service-oriented Vietnamese cybercriminal ecosystem (akin to ransomware-as-a-service model) centered around social media platforms such as Facebook," WithSecure said.

Your Details are Hidden on this Secret ID on Your Phone

 


The amount of people who want to exploit your private information is staggering, from social media platforms to email providers. It is imperative to remember not only online stores but personal services as well. 

Many online businesses rely heavily on your information, and they pay no attention to customer privacy. You are unknown to most advertisers and marketers. In addition, a Mobile Advertising ID (MAID) identifier is assigned to your behavior, and a history of your activities is gathered. 

With this tiny bit of information, your location, your shopping history, or your recent online searches can be accessed. There were very few factors you could control until recently to block your MAID from marketing campaigns. As a result of Apple's decision, iOS users now can choose who targets them through the app. 

Criminals, however, are likely to generate much greater profits if they can match the ID with the individual. A MAID's ability to defraud you Most companies or advertising agencies would not be able to find out who the MAID belongs to if he or she was not attached to a company. 

In this collection, there are numerous data sets, and there should be no personally identifiable information (PII) included in the collection. Vice's Motherboard wrote about one company that offers the tracking of MAIDs with the PII associated with each of them. 

The use of mobile phones in everyday life poses a considerable amount of privacy risk, which is a major concern. Your MAID can be linked to the following information that can be provided by the company:
  • Full name
  • Physical address
  • Phone number
  • Email address
  • IP address
There should be a red flag raised for everyone after it was revealed that data brokers are capable of integrating advertising IDs with mobile phone numbers.

Russian Man Convicted of $7 Million Digital Advertising Scam

 

A Russian person was found guilty in the United States of using a bot farm and hiring servers to create fraudulent internet traffic on media sites, causing businesses to pay inflated advertising rates. 

Prosecutors said Aleksandr Zhukov, 41, was the brains of the Methbot operation, in which 1,900 servers were used to generate millions of bogus online ad views on websites such as the New York Times and the Wall Street Journal. According to the US, Zhukov gained $7 million from the scheme and channeled the money into offshore accounts around the world, citing a text in which he referred to himself as the "King of Fraud." 

The group allegedly called their plan "Metan," which is the Russian term for methane, while the FBI and prosecutors referred to it as Methbot, and later as Media Methane, which was the name of Zhukov's company with operations in Russia and Bulgaria. 

Zhukov and his colleagues negotiated deals with advertising networks to display their ads on websites, then received a commission for each ad that was viewed. According to prosecution filings, Zhukov and his collaborators instead established bogus sites and manipulated data centres to produce false users to make it appear like actual people were viewing the ads from September 2014 to December 2016.

"Zhukov represented to others that he ran a legitimate ad network that delivered advertisements to real human internet users accessing real internet web pages," according to a superseding indictment filed on February 12, 2020. 

"In fact, Zhukov faked both the users and the webpages: he and his co-conspirators programmed computers that they had rented from commercial data centers in the United States and elsewhere to load advertisements on fabricated webpages, via an automated program, in order to fraudulently obtain digital advertising revenue," it says. 

Victims of the scheme "included The New York Times, The New York Post, Comcast, Nestle Purina, the Texas Scottish Rite Hospital for Children, and Time Warner Cable," the Department of Justice said in a news release. 

On a temporary US arrest order, Zhukov was arrested in Bulgaria in November 2018. In January 2019, he was extradited to the United States and pleaded not guilty to the accusations against him.

Tag Barnakle Targets Various Web Servers with Malicious Ads

 

In a persistent campaign that features malicious ads on tens of millions, if not hundreds of millions, computers, the criminals have infiltrated more than 120 ad servers and introduced malicious code to legitimate announcements that redirect visitors to sites that promote malware and fraud. This has been going on since the past year, thus attracting benign devices in all external appearances. The malicious activity group behind this campaign is identified by the name Tag Barnakle.

Malvertising is the phenomenon of advertising while the viewers are visiting trustworthy websites. The advertising includes JavaScript that exploits software faults surreptitiously and attempts to make tourists download an unsafe application, pay computer support charges fraudulently or perform other dangerous acts. In general, Internet fraudsters pose as shoppers and pay ad distribution networks for malicious advertising to be shown on individual pages. 

Resources are needed to infiltrate the ad ecosystem as a legitimate buyer. Firstly, scammers need to spend time studying the functioning of the industry and then create a reputable entity. The strategy also calls for the payment of money for space to display malicious advertising. Though this is not the method used by a malvertising group called Tag Barnakle. 

“Tag Barnakle, on the other hand, can bypass this initial hurdle completely by going straight for the jugular—mass compromise of ad serving infrastructure,” Confiant researcher Eliya Stein wrote in a blog. “Likely, they’re also able to boast an ROI [return on investment] that would eclipse their rivals as they don’t need to spend a dime to run ad campaigns.” 

Over the previous year, Tag Barnakle infected  more than 120 servers running Revive, an open-source application for companies who want to run their ad server instead of a third-party provider. Once an advertising server has been hacked, Tag Barnakle loads it with a malicious payload. The group does not use customer fingerprint identification to recognize the most enticing targets, to assure the malicious ads are received only in limited numbers. The servers which supply the targets with a secondary payload also use coating techniques to ensure they also fly below the radar.

As Confiant posted on Tag Barnakle last year, the community found that about 60 Revive servers had been compromised. This feature allowed the group to distribute advertising on over 360 web assets. The commercials have triggered fake Adobe Flash updates that install malware on desktop computers while it is running. Tag Barnakle targets both iPhone and Android customers this time. Web pages receiving an ad from an affected server provide extremely confused JavaScript to decide if a visitor uses an iPhone or Android smartphone. 

The advertisements are mainly aimed at highlighting fake protection, safety, or VPN apps with secret subscription fees or “siphon off traffic for nefarious ends.” The advertising may also be extended to thousands of individual websites with ad servers frequently combined with several publicity exchanges. Confident does not know how many terminal users are comprised but the company considers the number to be huge.