Late final yr, safety researchers made a startling discovery: Kremlin-backed disinformation campaigns have been bypassing moderation on social media platforms by leveraging the identical malicious promoting expertise that powers a sprawling ecosystem of on-line hucksters and web site hackers. A brand new report on the fallout from that investigation finds this darkish advert tech trade is much extra resilient and incestuous than beforehand recognized.

Picture: Infoblox.
In November 2024, researchers on the safety agency Qurium revealed an investigation into “Doppelganger,” a disinformation community that promotes pro-Russian narratives and infiltrates Europe’s media panorama by pushing pretend information via a community of cloned web sites.
Doppelganger campaigns use specialised hyperlinks that bounce the customer’s browser via an extended sequence of domains earlier than the pretend information content material is served. Qurium discovered Doppelganger depends on a complicated “area cloaking” service, a expertise that enables web sites to current totally different content material to serps in comparison with what common guests see. The usage of cloaking providers helps the disinformation websites stay on-line longer than they in any other case would, whereas guaranteeing that solely the focused viewers will get to view the supposed content material.
Qurium found that Doppelganger’s cloaking service additionally promoted on-line courting websites, and shared a lot of the identical infrastructure with VexTriowhich is regarded as the oldest malicious site visitors distribution system (TDS) in existence. Whereas TDSs are generally utilized by respectable promoting networks to handle site visitors from disparate sources and to trace who or what’s behind every click on, VexTrio’s TDS largely manages internet site visitors from victims of phishing, malware, and social engineering scams.
BREAKING BAD
Digging deeper, Qurium seen Doppelganger’s cloaking service used an Web supplier in Switzerland as the primary entry level in a series of area redirections. Additionally they seen the identical infrastructure hosted a pair of co-branded affiliate internet marketing providers that have been driving site visitors to sketchy grownup courting websites: Lospollos (.) With and Tacoloco (.) Co.
The LosPollos advert community incorporates many components and references from the hit sequence “Breaking Dangerous,” mirroring the fictional “Los Pollos Hermanos” restaurant chain that served as a cash laundering operation for a violent methamphetamine cartel.

The LosPollos promoting community invokes characters and themes from the hit present Breaking Dangerous. The emblem for LosPollos (higher left) is the picture of Gustavo Fring, the fictional rooster restaurant chain proprietor within the present.
Associates who join with LosPollos are given JavaScript-heavy “smartlinks” that drive site visitors into the VexTrio TDS, which in flip distributes the site visitors amongst quite a lot of promoting companions, together with courting providers, sweepstakes presents, bait-and-switch cell apps, monetary scams and malware obtain websites.
LosPollos associates usually sew these good hyperlinks into WordPress web sites which were hacked through recognized vulnerabilities, and people associates will earn a small fee every time an Web consumer referred by any of their hacked websites falls for one among these lures.

The Los Pollos promoting community selling itself on LinkedIn.
Based on Qurium, TacoLoco is a site visitors monetization community that makes use of misleading techniques to trick Web customers into enabling “push notifications,” a cross-platform browser customary that enables web sites to point out pop-up messages which seem exterior of the browser. For instance, on Microsoft Home windows programs these notifications usually present up within the backside proper nook of the display screen — simply above the system clock.
Within the case of VexTrio and TacoLoco, the notification approval requests themselves are misleading — disguised as “CAPTCHA” challenges designed to tell apart automated bot site visitors from actual guests. For years, VexTrio and its companions have efficiently tricked numerous customers into enabling these web site notifications, that are then used to repeatedly pepper the sufferer’s gadget with quite a lot of phony virus alerts and deceptive pop-up messages.

Examples of VexTrio touchdown pages that lead customers to simply accept push notifications on their gadget.
Based on a December 2024 annual report from GoDaddy, almost 40 % of compromised web sites in 2024 redirected guests to VexTrio through LosPollos smartlinks.
ADSPRO AND TECHNOLOGY
On November 14, 2024, Qurium revealed analysis to assist its findings that LosPollos and TacoLoco have been providers operated by Adspro Groupan organization registered within the Czech Republic and Russia, and that Adspro runs its infrastructure on the Swiss internet hosting suppliers C41 and Expertise to.
Qurium famous the LosPollos and TacoLoco websites state that their content material is copyrighted by ByteCore AG and SkyForge Digital AGeach Swiss companies which are run by the proprietor of Teknology SA, Giulio Vitorio Leonardo Cerutti. Additional investigation revealed LosPollos and TacoLoco have been apps developed by an organization known as Holacodewhich lists Cerutti as its CEO.
The apps marketed by Holacode embrace quite a few VPN providers, in addition to one known as Spamshield that claims to cease undesirable push notifications. However in January, Infoblox stated they examined the app on their very own cell gadgets, and located it hides the consumer’s notifications, after which after 24 hours stops hiding them and calls for cost. Spamshield subsequently modified its developer identify from Holacode to Aplabzthough Infoblox famous that the Phrases of Service for a number of of the rebranded ApLabz apps nonetheless referenced Holacode of their phrases of service.
Extremely, Cerutti threatened to sue me for defamation earlier than I’d even uttered his identify or despatched him a request for remark (Cerutti despatched the unsolicited authorized risk again in January after his firm and my identify have been merely tagged in an Infoblox submit on LinkedIn about VexTrio).
Requested to touch upon the findings by Qurium and Infoblox, Cerutti vehemently denied being related to VexTrio. Cerutti asserted that his firms all strictly adhere to the laws of the international locations during which they function, and that they’ve been fully clear about all of their operations.
“We’re a gaggle working within the promoting and advertising house, with an affiliate community program,” Cerutti responded. “I’m not (going) to say we’re excellent, however I strongly declare we now have no reference to VexTrio in any respect.”
“Sadly, as a giant participant on this house we additionally get to take care of loads of writer fraud, sketchy site visitors, pretend clicks, bots, hacked, listed and resold writer accounts, and many others, and many others.,” Cerutti continued. “We bleed a number of cash to such malpractices and conduct common inside screenings and audits in a relentless battle to take away dangerous site visitors sources. It is usually a extremely aggressive house, the place some upstarts will typically play soiled in opposition to extra established mainstream gamers like us.”
Working with Qurium, researchers on the safety agency Infoblox launched particulars about VexTrio’s infrastructure to their trade companions. Simply 4 days after Qurium revealed its findings, LosPollos introduced it was suspending its push monetization service. Lower than a month later, Adspro had rebranded to Aimed World.

A thoughts map illustrating a few of the key findings and connections within the Infoblox and Qurium investigations. Click on to enlarge.
A REVEALING PIVOT
In March 2025, researchers at GoDaddy chronicled how DollyWay — a malware pressure that has persistently redirected victims to VexTrio all through its eight years of exercise — all of a sudden stopped doing that on November 20, 2024. Nearly in a single day, DollyWay and several other different malware households that had beforehand used VexTrio started pushing their site visitors via one other TDS known as Assist TDS.
Digging additional into historic DNS data and the distinctive code scripts utilized by the Assist TDS, Infoblox decided it has lengthy loved an unique relationship with VexTrio (at the very least till LosPollos ended its push monetization service in November).
In a report launched at present, Infoblox stated an exhaustive evaluation of the JavaScript code, web site lures, smartlinks and DNS patterns utilized by VexTrio and Assist TDS linked them with at the very least 4 different TDS operators (not counting TacoLoco). These 4 entities — Companions Home, BroPush, RichAds and RexPush — are all Russia-based push monetization packages that pay associates to drive signups for quite a lot of schemes, however principally on-line courting providers.
“As Los Pollos push monetization ended, we’ve seen a rise in pretend CAPTCHAs that drive consumer acceptance of push notifications, significantly from Companions Home,” the Infoblox report reads. “The connection of those industrial entities stays a thriller; whereas they’re actually long-time companions redirecting site visitors to 1 one other, and so they all have a Russian nexus, there isn’t a overt widespread possession.”
Renee Burtonvp of risk intelligence at Infoblox, stated the safety trade usually treats the misleading strategies utilized by VexTrio and different malicious TDSs as a form of legally gray space that’s principally related to much less harmful safety threats, comparable to adware and scareware.
However Burton argues that this view is myopic, and helps perpetuate a darkish adtech trade that additionally pushes loads of straight-up malware, noting that a whole lot of hundreds of compromised web sites around the globe yearly redirect victims to the tangled internet of VexTrio and VexTrio-affiliate TDSs.
“These TDSs are a nefarious risk, as a result of they’re those you possibly can connect with the supply of issues like data stealers and scams that price shoppers billions of {dollars} a yr,” Burton stated. “From a bigger strategic perspective, my takeaway is that Russian organized crime has management of malicious adtech, and these are simply a few of the many teams concerned.”
WHAT CAN YOU DO?
As KrebsOnSecurity warned means again in 2020, it’s a good suggestion to be very sparing in approving notifications when searching the Internet. In lots of circumstances these notifications are benign, however as we’ve seen there are quite a few dodgy companies which are paying web site homeowners to put in their notification scripts, after which reselling that communications pathway to scammers and on-line hucksters.
In the event you’d like to forestall websites from ever presenting notification requests, all the main browser makers allow you to do that — both throughout the board or on a per-website foundation. Whereas it’s true that blocking notifications completely can break the performance of some web sites, doing this for any gadgets you handle on behalf of your much less tech-savvy associates or members of the family may find yourself saving everybody quite a lot of headache down the highway.
To switch web site notification settings in Mozilla Firefoxnavigate to Settings, Privateness & Safety, Permissions, and click on the “Settings” tab subsequent to “Notifications.” That web page will show any notifications already permitted and help you edit or delete any entries. Tick the field subsequent to “Block new requests asking to permit notifications” to cease them altogether.
In Google Chromeclick on the icon with the three dots to the appropriate of the handle bar, scroll all the way in which right down to Settings, Privateness and Safety, Website Settings, and Notifications. Choose the “Don’t enable websites to ship notifications” button if you wish to banish notification requests perpetually.
In Apple’s Safari browser, go to Settings, Web sites, and click on on Notifications within the sidebar. Uncheck the choice to “enable web sites to ask for permission to ship notifications” if you happen to want to flip off notification requests completely.