“It’s pretty much the same thing – catching the bad guy from the intelligence point of view and targeting a good guy to give them the right [content],” Given Israel “dominates advertising, period”, adds Goldi, it should be no surprise the injection game is full of former intelligence officials.
Dan Goldi Ex Unit 8200 TRUST US GOYIM
The ad injection process effectively intercepts users’ traffic to inject content, namely, those irritating adverts and popups that seem to come from nowhere. The software used to inject ads arrives via software often bundled into application downloads or offered as directly-downloaded browser extensions. The Stanford and Google researchers, who collected data on the industry , flagged 50,870 Chrome extensions as unwanted ad injectors, 38 per cent of which they decided were malware harmful to the security of users’ data.
Once on a user’s browser, the injector will effectively hijack a browser session and insert adverts on the page when a partnered website is visited. In most cases, the software has complete control over what appears on the user’s screen,to the extent it might hijack mouse clicks or force other interactions on the site. The user simply has to trust the software won’t do anything malicious.
In other words software sent by supposedly former Israeli tech spies now control your browser and thus your internet interactions The phrase hijack mouse clicks and force other interactions sounds ominous
A vulnerable ad injector could be exploited by hackers to kill security protections in the browser, notes Udi Yavo, CTO at Israeli security company enSilo, and they can relay plenty of information back to the software author, including usernames and passwords.
Your usernames and passwords can be sent directly to servers in Israel run by *former* Unit 8200 personnel after your adware/malware compromised laptop/PC security has been killed Now if that doesnt scare the hell out of you Im not sure what can
The companies involved in this type of business do sometimes male a lot of money depending on commercial parameters like ad clicks purchases made etc So no one has any issue with Israeli civilians being part of that business But when most if not all of these companies have been confounded by former Unit 8200 operatives you cant help wonder at the motives behind these firms
So here’s a list of Unit8200 Ad Injectors
After it was spotted sitting on Lenovo PCs intercepting traffic throughout late 2014, breaking web encryption along the way, essentially destroying any trust users could have had in their online sessions, it emerged that not only its founder Adi Pinhas was formerly of 8200, he was also employed by Verint, which was linked to NSA surveillance. The company that actually created the encryption-breaking tech behind Superfish, Komodia, was also connected to Israeli intelligence services via its owner Barak Weichselbaum.
Despite Superfish’s dominance there are many others. Ranked by the researchers as the second most popular ad injecting program with 2.4 per cent of Google views, Jolly Wallet doesn’t actually install software on the users’ hard drive . It does, however, typically come packaged in a browser extension with permissions to read and alter all web content, its aim being to present cashback offers across different sites. It also often runs alongside other injection libraries.Jolly Wallet was created by Radyoos, which was co-founded in 2011 by Roy Zisapel, who is also CEO of security provider Radware. He doesn’t advertise his connections to Unit 8200, though in an article from 2011 Zisapel notes he was part of the division.
No Problem PPC
No Problem PPC is ranked as the seventh most popular ad injector, with 0.44 per cent of Google pageviews. The company’s main service allows website owners to connect visitors with contractors and small businesses they might be looking for. If the user is interested they can offer up information and call listed companies provided by the widget. Useful, no?
But the company’s tool has been seen bundled with other apps as a browser extension, Brotherston says. And, as with the others listed here, there are a number of removal walkthroughs for No Problem PPC. Company founder Daniel Shaked, was an IDF reserve for nearly 12 years Shaked says No Problem only connects web users with professionals, first online then over the phone, and it makes money where it facilitates that final call.
Ranked 11th on Google’s most popular ad injectors is DonationTools, run by a company called iRobinHood.Its package both modifies what appears on the page and adds a toolbar to the browser
As the name would suggest, iRobinHood attempts to encourage web users to donate to charity.In a brief telephone conversation with FORBES, founder Moti Golden said he could not comment on its ad injection practices The organisation counts a number of ex-IDF members amongst its developers, according to LinkedIn profiles A Google search shows many are concerned about what the program can do, with some labelling it adware and advising users to steer well clear as its pop-ups link to non-charitable offers.
A vast number of companies are affiliated with ad injectors, either packaging their tools or funnelling ads down to them. One of the biggest is Crossrider, the majority stake of which is held by billionaire Teddy Sagi, a serial entrepreneur and ex-con who was jailed for insider trading in the 1990s. His biggest money maker to date is gambling software developer Playtech. Co-founder and CEO Koby Menachemi was part of Unit 8200, where he was a developer for three years.
According to the Google report, Crossrider was doing plenty of work with Superfish US antivirus giant Symantec ranks one service based on Crossrider’s software, Crossid, as adware with a “high” risk impact. It warns Crossid can inject content and collect information about the user , such as IP address, operating system and browser information.
Lee Brotherston of Leviathan Security says the involvement of ex-8200 personnel in the “very dangerous” injection business is “troubling”. If Unit 8200 have access, via ex-members, then a signals intelligence unit potentially has direct access to view the contents of what someone is browsing and modify the content,” he added.
Nicholas Weaver, computer security researcher at the International Computer Science Institute in Berkeley, has different concerns around Unit 8200. He’s worried injectors may be transmitting user data from across the world to Israeli servers over unencrypted HTTP connections. “What worries me is whether any of these systems might cause users to fetch data from Israeli servers over HTTP. These companies may consider themselves benign, but the Israel government is notorious for hacking and industrial espionage, and the Israeli government can use any such traffic to hack individual targets,” Weaver adds.
If Unit 8200 have access, via ex-members, then a signals intelligence unit potentially has direct access toview the contents of what someone is browsing and modify the content,” he added.
Injectors may be transmitting user data from across the world to Israeli servers and the Israeli government can use any such traffic to hack individual targets
A vulnerable ad injector could be exploited by hackers to kill security protections in the browser, and they can relay plenty of information back to the software author, including usernames and passwords.