More rogue Flash ads

Posted by   Virus Bulletin on   Jan 1, 2008

Rogue ads infiltrate Expedia and Rhapsody sites.

Following on from last month's feature on the SWF.AdHijack family (see VB, January 2008, p.12), malicious Flash ads were found to have made their way into popular travel site Expedia.com and music download site Rhapsody.com.

According to Trend Micro researchers, the Expedia site was infiltrated by a variant of the SWF.AdHijack family - clicking on the ad led to a number of redirections, which eventually resulted in the installation of a piece of rogue anti-spyware detected by Trend as TROJ_GIDA.A.

The malicious ad found on the Rhapsody site similarly redirected users to a page that attempted to install a bogus program on the user's machine by reporting a (non-existent) system infection, and then urging them to purchase the software needed to 'clean' the infections.

Investigators estimate that the ads were active on the Rhapsody site for six days before being removed. According to Expedia an 'imposter advertiser' managed to circumvent the company's advertising policy. At the time of writing the company didn't know how long the ad had been active.

Posted on 01 February 2008 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VBSpam tests to be executed under the AMTSO framework

VB is excited to announce that, starting from the Q3 test, all VBSpam tests of email security products will be executed under the AMTSO framework.

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.