Security Market Segment LS
Wednesday, 15 May 2019 10:23

CSIRO team says top websites could host malicious activity

CSIRO team says top websites could host malicious activity Image by tsmr from Pixabay

Researchers from the CSIRO's Data61 digital arm say they have found that about half of the most popular websites are at risk of malicious activity because they depend on a number of third parties for ad provision, tracking and analytics services and content distribution networks.

Further, these third-party sites could, in turn, be dependent on resources from other domains, leading to a dependency chain of more than 30 domains - all underpinned by a form of implicit trust with the original website.

And the bigger and more complex the dependency chain, the greater the threat of malicious activity, the researchers concluded.

Professor Dali Kaafar, Information Security and Privacy research leader at CSIRO’s Data61 and scientific director of Optus Macquarie University Cyber Security Hub, said that although these webs of dependency were common and due to web design decisions, the implications on security and privacy were often overlooked.

“Almost all websites today are heavily embedded with tracking components," Professor Kaafar said. "For every website you visit, you could be unknowingly loading content from potentially malicious parties and leaving a trail of your Internet activity.”

The researchers had also found that 1.2% of the third parties that were linked to the top 200,000 sites were suspicious. And, they said, JavaScript, which was generally used to improve the user experience, represented the greatest risk of malicious activity as it would execute without being detected.

“The potential threat should not be under-estimated, as suspicious content loaded on browsers can open the way to further exploits, including distributed denial of service attacks which disrupt traffic to websites, and ransomware campaigns which cost the world more than US$8 billion in 2018,” Professor Kaafar said.

“Worryingly, the original or ‘first party’ websites have little to no visibility of where these resources originate. This points to a lack of ‘trustability’ of content on the Web, and the need to better regulate the Web by introducing standardised security measures and the notion of explicit trust.”

Rectifying this issue would require the involvement of the World Wide Web Consortium and major tech firms, apart from additional research, he said.

In the interim, browser extensions like ad-blockers and JavaScript blockers would limit one's exposure to potential malicious activity.

The researchers will present their paper The Chain of Implicit Trust: An Analysis of the Web Third-party Resources Loading, at The Web Conference in San Francisco on 15 May (16 May AEDT).


Did you know: 1 in 10 mobile services in Australia use an MVNO, as more consumers are turning away from the big 3 providers?

The Australian mobile landscape is changing, and you can take advantage of it.

Any business can grow its brand (and revenue) by adding mobile services to their product range.

From telcos to supermarkets, see who’s found success and learn how they did it in the free report ‘Rise of the MVNOs’.

This free report shows you how to become a successful MVNO:

· Track recent MVNO market trends
· See who’s found success with mobile
· Find out the secret to how they did it
· Learn how to launch your own MVNO service


Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.



Recent Comments