Categories: Cyber Security News

D-Shortiez Malvertising Campaign Hijacks WebKit Back-Button For Forced Redirects

In the ever-evolving world of malvertising, where bad actors continually refine their techniques, a new campaign targeting Apple Safari users has surfaced.

Known as D-Shortiez, this campaign exploits a back-button hijack technique in Safari to force redirections. This tactic effectively traps victims in malicious click chains that lead to scams.

The key component of this campaign lies in a JavaScript payload that manipulates the browser’s history.pushState method.

By using this function, the threat actor adds an empty entry to the browser’s history stack, which effectively neutralizes the back button. If the user navigates back, the onpopstate event triggers, redirecting the victim to a new malicious URL.

This technique is particularly effective because it prevents users from leaving the page by clicking the back button, a common action for individuals trying to avoid unwanted sites.

The attackers use this trick to keep users on malicious websites where they are typically presented with scams such as fake tech support offers or phishing forms.

Testing The Exploit Across Browsers

The exploit was tested across several major browsers. While most browsers responded as expected, Safari, in particular, reacted differently.

By using the back-button hijack technique, the attackers created an uninterrupted flow of redirections, increasing the likelihood of successful scam encounters. This forced redirect could mislead the user into interacting with malicious content they might otherwise have avoided.

For example, the following code snippet was used to test the exploit:

redirectUrl = 'http://google.com/search?q=';

if (window.top.history && window.top.history.pushState) {

    window.top.history.pushState(null, null, '');

    window.top.onpopstate = function (event) {

        window.top.location.href = redirectUrl + 'back';

    };

    let u1 = redirectUrl + 'click';

    window.top.document.body.addEventListener('click', function () { window.top.location.href = u1; }, true);

}

When this code was executed on Safari, the result was clear: the back button was hijacked, trapping the victim in the redirect loop, and the attacker had full control over the navigation flow.

Sponsored

The D-Shortiez campaign has been highly active, with over 300 million malicious ad impressions served, primarily targeting U.S. users but also trickling into Canada and parts of Europe. The attacks have been consistent since August 2025, with periods of intense activity.

Data analysis of the campaign’s reach shows a distinct preference for iOS users, indicating that D-Shortiez has focused efforts on Apple’s mobile operating system. The increased targeting of Safari users further underscores the campaign’s scale and growing impact on the user base.

Timeline and Resolution

The issue was reported to Apple in late September 2025. By January 2026, a security update was issued to address the Confiant back-button hijack vulnerability in Safari (Reference: Apple’s Safari security update).

Metric Details Source
Impressions 300M+ (6 months) Confiant telemetry
Top Geo US (primary), CA/EU (secondary) Confiant trends
Platform iOS/Safari (predominant) Confiant analysis
Activity Bursts since Aug 2025 Confiant graphs

The D-Shortiez malware campaign is a reminder of the evolving sophistication of web-based attacks. By targeting browser-specific vulnerabilities, this campaign demonstrates how minor weaknesses can be exploited for large-scale malicious gains.

Although Apple has addressed the issue with an update, it’s a timely reminder for users and organizations to stay vigilant against increasingly subtle and persistent malvertising techniques.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post D-Shortiez Malvertising Campaign Hijacks WebKit Back-Button For Forced Redirects appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Today’s Best Deals: Pokémon Legends: Z-A for Switch 2, Disney+ and Hulu Bundle, and Venomnibus Collection

Whether you’re looking to cosplay as Spider-Man or want to have arguably the best Venom…

11 minutes ago

The Mandalorian and Grogu Director Jon Favreau Compares Jeremy Allen White’s Rotta the Hutt to Adonis Creed

The Bear star Jeremy Allen White is making the jump to the Star Wars galaxy…

11 minutes ago

RingH23 Hackers Target MacCMS and CDN Infrastructure

A new cybercriminal campaign, linked to the notorious Funnull group, has targeted both Content Delivery…

41 minutes ago

Microsoft 365 Outage Hits North America as CDN Misconfiguration Disrupts Multiple Services

Microsoft is actively investigating a service disruption affecting multiple Microsoft 365 products for users in…

1 hour ago

Star Wars: Hasbro Reveals New Line of Maul – Shadow Lord Figures

With the premiere of Star Wars: Maul - Shadow Lord just weeks away, we're starting…

1 hour ago

The FlashForge AD5X Is One of the Best CoreXY Multi-Color 3D Printers Priced Under $300

One of the better regarded 3D printers with multi-color print capability is now priced well…

1 hour ago

This website uses cookies.