Mar 12, 2017

How Advertisement Hijack Ads-owner's contents


(update: they fixed the problem )

When I tried to read article in Nikkei, chrome in Android move without any notification to strange website. (caution: please don't access URLs in the pics)

What I tried to read (Japanese only):

This advertisement just hurt the brand image of owner website (this case it's Nikkei). And other users also have met the same problem:!msg/chrome/AzyvOJ1xcYg/L354tQk1BAAJ

Here is also interesting comment (

TNTBrian said:
Even if it is an advertiser, Chrome is still being exploited.
Also it does not happen on an older version of Chrome -- At least for me. Would love to see if the same is true for others.
After reading, I have two questions.
  1. How it works?
  2. Why does Chrome allow the problematic script to run?

track requests to know how it works

here is recorded *.HAR in Google Chrome when I read

In the response, one amazon ec2 instance sent response with javascript that includes the domain "comumx[dot]site" that is the original site of the above picture.
It does move webpage forcely to comumx[dot]site.
After checking a bit, I realized this script was triggered in the following steps:
  7. ( this responses with problematic javascript )
Now it's clear why it happens :)

why Chrome allowed this script to run?

According to the registory information in WHOIS, the domains belonged as follows.
  1. NIKKEI (
  2. Google (
  3. Google (
  4. Rubicon project (
  5. Rubicon project (
  6. MediaMath (
  7. ( this responses with problematic javascript )
NIKKEI is a user of google advertisement network in their website.
Unfortunately I haven't heard anything about "Rubicon project" and "MediaMath". After googling, I realized they are advertise network company / agency.
Rubicon Project seems to belong to the IAB. Thus they should not allow such an advertisement generally.
MediaMath is described in crunchbase. ( Their codebase also includes the requests against "*" i.e.
HTTP response from Rubicon Project includes the following
    "pingdom_id": "2117306",
    "ttl": 7,
    "img": "",
    "secure": {
 "img": ""
    "partner": "mediamath-pub"

Thus naturally MediaMath is a business partner of Rubicon Project.
this domain, "pixel[dot]mathtag[dot]com" has already raised some discussions before:
Now we know which companies related to this problem and their relations.
  1. Google shows advertisement from partner company, Rubicon Project
  2. Rubion Project loads some script from partner company, MediaMath
  3. MediaMath loads some (unfortunately malicious) scripts from their clients.
From the viewpoints of typical business contracts, MediaMath should take responsibility to check the codes from their client.
And I guess it's fatal if advertisement can hijack the contents of owner of the advertisement.

If you have any feedbacks, please leave a comment.