Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

The Future of Process Automation is Here: Meet TwinH

X’s advertising business has improved under the late CEO Linda Yaccarino, but it remains a difficult time to come

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » How Vextrio and Affiliates run a global fraud network
Identity

How Vextrio and Affiliates run a global fraud network

userBy userJune 12, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

June 12, 2025Ravi LakshmananThreat Intelligence/Malware

The threat actors behind the Vextrio Viper Traffic Distribution Service (TDS) are linked to other TDS services, such as Help TD and disposable TDS, indicating that sophisticated cybercrime operations are their own vast enterprises designed to distribute malicious content.

“Vextrio is a group of malicious Adtech companies that distribute fraud and harmful software through a variety of advertising formats, including SmartLinks and Push Notifications,” Infoblox said in a deep dive report that it shares with Hacker News.

Malicious Adtech companies under Vextrio Viper include Los Pollos, Taco Loco and Adtrafico. These companies operate what is known as commercial affiliate networks where users land and connect malware parties that connect websites illuminated by “advertising affiliates” with so-called “advertising affiliates” that provide various forms of illegal schemes, such as gift card fraud, malicious apps, phishing sites, and scams.

Cybersecurity

Put another way, these malicious traffic delivery systems are designed to redirect victims to their destinations through SmartLink or direct offers. According to DNS threat intelligence firm, Los Pollos involves malware distributors (aka affiliates) in their promise of high-paying offers, but Taco Loco specializes in pushnetization and is recruiting advertising affiliates.

Another notable element of these attacks is the compromise of WordPress websites injecting malicious code responsible for starting the redirect chain, which ultimately leads visitors to the Vextrio Scam Infrastructure. Examples of such injections include Balada, Dollyway, Sign1, and DNS TXT Records campaigns.

“These scripts redirect site visitors to various scam pages. The traffic broker network associated with Vextrio is one of the largest known cybercrime affiliate networks that leverage sophisticated DNS technologies, traffic distribution systems and domain generation algorithms to provide malware and fraud.

Vextrio’s operations were hit around mid-November 2024 after Qurium revealed that Swiss and Czech Adtech Company Los Pollos is part of Vextrio. This has caused escapes, and now moves threat actors who rely heavily on the LOS Pollos network to alternative redirect destinations such as Help TDs and disposable TDs.

An analysis of InfoBlox of 4.5 million DNS TXT record responses from compromised websites over six months revealed that domains that were part of the DNS TXT record campaign could be categorized into two sets, each with their own command and control (C2) servers.

“Both servers were hosted on infrastructure connected to Russia, but neither the hosting nor the TXT response was duplicated,” the company said. “Each set maintained a different redirect URL structure despite both being originally led by Vextrio and subsequently leading to HELT TDS.”

Further evidence has emerged that both the TDS and disposable TDs are identical, supporting the service enjoying an “exclusive relationship” with Vextrio until November 2024. HELTTDS has moved to Monetizer, a monetization platform where TDS, historically redirected to the Vextrio domain, uses TDS to connect to publisher affiliates.

Cybersecurity

“Help TDS has a strong Russian nexus, and hosting and domain registration is frequently done through Russian entities,” Infoblox said, describing the operator as perhaps independent. “There is no full-scale functionality of the Vextrio TDSS, and there is no obvious commercial connection beyond the creepy connection with Vextrio.”

Vextrio is one of many TDSs that have been out as a commercial ad tech company, others being Partner House, Blopsh, Richad, adm sin, and rexpush. Many of these are directed towards push notification services using Google Firebase Cloud Messaging (FCM). Alternatively, push an API-based custom development script to distribute links to malicious content via push notifications.

“Every year, hundreds of thousands of compromised websites around the world redirect victims to the intertwined web of vextrio and TDSS protecting vextrio,” the company said.

“Vextrio and other affiliate ad companies know who the malware actors are, or at least have enough information to track them. Many companies are registered in countries that require a certain amount of “know your customers” (KYC), but even without these requirements, public affiliates are reviewed by customer managers. ”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHarvard University researcher charged with smuggling a frog embryo is released from federal custody on bail
Next Article Digital banking startup Chime pops with IPO debut, raising $700 million at a valuation of $11.6 billion
user
  • Website

Related Posts

The Future of Process Automation is Here: Meet TwinH

July 9, 2025

Gold Melody IAB exploits exposed ASP.NET machine keys to unauthorized access to targets

July 9, 2025

donot apt expands operations and targets the European Ministry of Foreign Affairs with lopticmod malware

July 9, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

The Future of Process Automation is Here: Meet TwinH

X’s advertising business has improved under the late CEO Linda Yaccarino, but it remains a difficult time to come

Jack Dorsey says his “safe” new bitchat app hasn’t been tested for security

YouTube prepares crackdowns on “mass production” and “repeated” videos as concerns about AI slops grow

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.