Malvertising Threat Actor ‘D‑Shortiez’ Abuses WebKit Back‑Button Hijack in Forced‑Redirect Browser Campaign

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A threat actor tracked as D-Shortiez has been running a persistent malvertising campaign that turns a WebKit browser behavior into a trap, forcing iOS Safari users into scam pages with no easy way out.

The campaign is not entirely new in concept — forced redirect attacks have long been a fixture of the online ad fraud ecosystem — but D-Shortiez has introduced a technical element that sets it apart: a back-button hijack that strips victims of their ability to navigate away once they land on a malicious destination.​

For much of the ad industry’s recent history, forced redirect campaigns have been losing ground steadily as advertising platforms and browser developers have tightened their defenses.

The malvertisers who continue running these operations tend to survive by picking up small technical advantages wherever they can find them.

These advantages are often subtle — quirks in browser behavior, gaps in ad platform filtering, or edge cases in how scripts execute across different environments — but they add up to a measurable improvement in how far a campaign can reach and how long it can run before being shut down.​

Click-chains (Source – Confiant)

Confiant analysts identified D-Shortiez as a group actively running forced redirect campaigns that push victims down malicious click-chains surfacing familiar online scams.

Their close examination of the group’s payload revealed that it opens with standard fingerprinting and tracking functions — nothing that would typically raise immediate concern.

However, what drew the researchers’ attention was the redirect mechanics itself, specifically a nested try/catch block beginning at line 211, which handles the actual forced redirection by firing multiple redirect attempts simultaneously.

This is a known tactic, as different browsers respond differently to redirect calls, and bad actors have learned that throwing everything at once maximizes the odds of success.​

The scale of this campaign is significant. Over the last six months, D-Shortiez has served more than 300 million malicious ad impressions, targeting US audiences most heavily, with reach extending into Canada and across parts of Europe. The iOS platform has been the primary target.

Activity has maintained a fairly consistent pace since August, but the trend data reveals something more calculated — sharp, aggressive bursts of high-volume delivery followed by brief pauses, the kind of cadence that suggests a group actively managing its footprint.​

The Back-Button Hijack: How D-Shortiez Traps Safari Users

The most technically distinctive aspect of this campaign is how D-Shortiez exploits the browser’s popstate event to prevent victims from navigating away from scam pages on Safari.

The payload uses window.top.history.pushState() to insert a fake entry into the browser’s session history stack.

An onpopstate event handler bound to window.top then catches any back-button press and redirects the user to the scam URL — appending a “back” parameter — instead of returning them to the legitimate page they left behind.​

When tested across all major browsers, the payload produced no unusual behavior in nearly every environment. Safari was the clear exception.

On iOS, the script worked exactly as intended — effectively locking the back button and keeping victims stuck on scam pages with no clean route out.

The behavior mirrors old browser-trapping techniques that scammers have used for years, but rather than relying on pop-ups or deceptive interface elements, D-Shortiez leverages a specific WebKit behavior to achieve the same effect more quietly and with greater reliability.​

The vulnerability was disclosed to Apple on September 29, and Apple patched it through a Safari security update issued on January 23, identified as HT213600. iOS and Safari users who have not yet applied this update remain directly exposed to this back-button hijack.​

All iOS and Safari users should install Apple’s security update HT213600 without delay to eliminate this specific vulnerability from their devices.

Security and ad operations teams should audit their ad supply chains for redirect-based payloads and block all known D-Shortiez IOC domains at the DNS and network level.

These IOCs span a wide network of wildcard subdomains across extensions including .shop.site.homes.beauty.skin.boats.cyou, and several other top-level domains.

Follow us on Google News, LinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.