Cybercriminals are increasingly leveraging the Keitaro advertising tracker to mask fraudulent activities and distribute malware, according to a new report from Infoblox Threat Intel and Confiant. Over a four-month investigation, researchers uncovered approximately 15,500 malicious domains utilizing this commercial marketing software.
This alarming trend indicates a growing trend of cybercriminals appropriating legitimate marketing tools for online fraud, with investment scams masquerading as AI trading offers emerging as the most prevalent category. The same infrastructure was also found to facilitate information-stealing malware and various other fraudulent schemes.
The researchers observed thousands of instances of malicious Keitaro usage employing domain cloaking tactics. This technique enables operators to display benign content to certain visitors, such as moderators or security analysts, while redirecting targeted individuals to scam websites or malware downloads. Traffic to these fraudulent operations originated from diverse sources, including compromised websites, spam, social media, and online advertising.
By analyzing the advertising supply chain and DNS data, Infoblox and Confiant were able to piece together a comprehensive view of how this infrastructure operates. Their collaboration provided insights that each company could not achieve independently, highlighting the sophistication of the cybercrime ecosystem.
The research underscores a significant shift in the economics of cybercrime, where criminal groups no longer need to create cloaking systems from scratch. Instead, they can purchase or pirate existing software typically used by legitimate marketers for traffic management and campaign performance tracking. Keitaro stands out as a user-friendly self-hosted advertising tracker that has been repurposed, even though it has phased out support for cloaker integrations.
The utilization of commercial tools by cybercriminals reflects a broader trend that allows for reduced costs and accelerated scaling of fraudulent campaigns. This shift complicates efforts to distinguish between normal digital advertising traffic and malicious activity.
Among the various scams identified, those branded with AI buzzwords were particularly rampant. Many fraudulent pages touted “Smart AI Trading Technology” or “Intelligent Trading Solutions,” claiming that automated systems could deliver astonishing returns on investment. Some campaigns even incorporated deepfake imagery or video content to enhance their credibility. The researchers noted that generative AI appears to be aiding these operators in creating headlines, marketing copy, and visuals for their scam pages and advertisements at scale.
This combination of cloaking tactics and AI-themed branding illustrates how fraud campaigns are evolving in response to public interest in emerging technologies. By embedding traditional investment scams within the framework of automation and machine intelligence, perpetrators may be attempting to enhance click-through rates and reduce skepticism among potential victims.
Importantly, the issues surrounding Keitaro extend into a wider ecosystem of software, hosting, domains, ad distribution, and spam delivery that collectively form a backbone for criminal infrastructure. Cloaking has become integral to many cybercrime operations, facilitating evasions of advertising and content restrictions, while also allowing distinct user experiences based on targeted redirections.
The investigation into Keitaro also included efforts to disrupt certain malicious activities and assess the use of stolen licenses, suggesting that some of the abuse hinges on pirated or compromised access rather than merely legitimate subscriptions.
For ad-tech firms, cybersecurity vendors, and internet platforms, the findings raise critical concerns about how ordinary commercial products can be weaponized for fraudulent purposes. The research emphasizes the growing intersections between ad-tech infrastructure and cybercrime, particularly in areas related to redirection, audience targeting, and performance analytics.
Security experts have long warned that malicious campaigns increasingly mimic standard digital marketing operations. The use of trackers, routing systems, ad creatives, and optimization techniques means that scams can be tested and refined in ways akin to legitimate online advertising efforts. This blurring of lines complicates enforcement actions, as abuses may only become apparent when investigators connect DNS records, ad placements, spam flows, and web content over time.
Dr. Renée Burton, Vice President of Infoblox Threat Intel, remarked, “For years, Keitaro has popped up in individual investigations, but no one had stepped back to ask how big the problem really is. We found that Keitaro frequently appeared in malicious campaigns – but the story really isn’t about Keitaro; they are just one player in an ecosystem that malicious actors are using to scale and target attacks around the globe.”
See also
Enhance Your Website”s Clarity for AI Understanding and User Engagement
FoloToy Halts Sales of AI Teddy Bear After Disturbing Child Interactions Found
AI Experts Discuss Vertical Markets: Strategies for Targeted Business Growth
Law Firms Shift to AI-Driven Answer Engine Optimization for Enhanced Marketing Success
Anthropic Disrupts State-Sponsored Cybercrime Using Claude AI, Reveals Key Insights



















































