Security researchers select uncovered a malvertising drive used to distribute malware to visitors of The Huffington Post website, every bit good every bit several other sites, through malicious advertisements served over the AOL advertising network.
At the halt of final year, Cyphort Labs, safety theatre specialized inward detecting malware threats, came across to a greater extent than or less malicious advertisements that were beingness served on the States together with Canadian versions of the pop tidings website The Huffington Post.
The malicious advertisements eventually redirected visitors of the tidings website to other websites hosting exploit kits, inward lodge to assail victims’ computers together with install malware.
Researchers discovered that the malvertising drive originates alongside ads beingness served yesteryear AOL’s Advertising.com network. Once clicked, users are redirected through a serial of redirects, to a greater extent than or less of which used HTTPS encrypted connections, to a page that served either the Neutrino Exploit Kit or the Sweet Orange Exploit Kit.
"Interestingly attackers used a mix of HTTP together with HTTPS redirects to shroud the servers involved inward this attack," the Cyphort analysis of the assail states. "The HTTPS redirector is hosted on a Google App Engine page. This makes analysis based on traffic PCAPs to a greater extent than difficult, because HTTPS traffic is encrypted."
The exploit kit served both Adobe Flash together with VB script exploits – a mutual target for cybercriminals due to the broad attain of vulnerabilities institute inward it – together with and thus downloaded the Kovter trojan, which is genuinely a Ransomware that locks the infected computer's covert from access yesteryear the user.
"The role of this assail is to install a malicious binary – a novel variant of a Trojan, from the Kovter family. (SHA1: eec439cb201d12d7befe5482e8a36eeb52206d6f)," the researchers say. "The malware was downloaded from indus.qgettingrinchwithebooks.babia-gora.pl:8080 , it was a un-encrypted binary. After execution it connects to a16-kite.pw for CNC. It executes through injecting its payload to a spawned svchost.exe process."
The websites hosting the exploit kit were ".pl" domains, the province code top-level domain for Poland. Researchers also noticed that a diversity of other websites, including weatherbug.com, mandatory.com together with houstonpress.com, were also distributing the malware via malicious advertisements, alongside the mutual link beingness the "adtech.de" together with "advertising.com" advertising networks — both advertizement platforms owned yesteryear AOL.
AOL.com was notified of the number on Saturday. H5N1 spokesman confirmed Cyphort’s findings together with said the companionship took the necessary steps to create the problem. AOL.com said it has stopped malicious software beingness served yesteryear its advertising platforms afterwards beingness alerted yesteryear a safety company.
"AOL is committed to bringing novel levels of transparency to the advertising process, ensuring ads uphold character standards together with create positive consumer experiences," the spokesman wrote.