Security researchers have spotted malware being distributed through malicious advertisements on xHamster, a popular adult website.
Tens of thousands of visitors to the site are likely to have been affected, according to security firm Malwarebytes, which said the ad was spotted on Friday and disabled by the end of Saturday.
The campaign served malicious advertisements through ad provider TrafficHaus, which was also made use of in a similar incident in January, Malwarebytes said.
The malicious ad, which targeted Windows systems running Internet Explorer, also made use of Google’s link-shortening service, goo.gl, to help evade services that blacklist links known to be malicious.
“Simply going on xHamster’s website could infect a PC if the browser or one of its plugins was not up to date,” said Malwarebytes’ Jérôme Segura in an advisory. “We notified TrafficHaus, which responded immediately to shut down the malicious ad, helping to limit the number of victims.”
The campaign was unusually clever in its methods for concealing itself, striking only once per user IP address, relying on a known and trusted URL shortening service and hiding itself within an innocuous-looking piece of code, Segura said.
“Although Google did eventually blacklist the URL, it should be noted that cyber crooks are constantly rotating through new shortened links, making this a cat and mouse game, where the mouse tends to always win,” Segura wrote.
After building a shortened URL that redirected users to an exploit kit called Angler, the web page containing Angler scanned users’ systems to see if they were running Kaspersky or Norton security software before attempting to exploit a known Internet Explorer vulnerability to implant malware called Bedep a Trojan horse that is capable of downloading other malware from the Internet.
In this case, Bedep was used to download a tool used to generate fraudulent advertising traffic, invisibly sending false ad views from a user’s system to various ad networks, Segura said. Bedep also loads another exploit kit called Magnitude, probably as a way of selling access to the infected system to others, according to Segura.
Malwarebytes recommended users ensure their systems are fully up to date.
“We have observed countless attacks via malvertising taking advantage of recently patched security flaws,” Segura wrote.
Are you a security pro? Try our quiz!
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…