Monday, February 28, 2011

Exchange Serves Up Rouge Ads

Booby-trapped adverts that strike visitors with counterfeit safety program have been detected on the London Stock Exchange (LSE) website.

Analysis of the LSE site suggests that over the final 90 days, about 363 pages had hosted malware.

The LSE mentioned its site was right away protected and an scrutiny showed that ads supposing by a third celebration were the culprit.

One plant claimed his Personal Computer was done obsolete after being infected.

Security consultant Paul Mutton fell plant when he noticed the site on 27 February.

He visited the LSE homepage to find out because a few people reported that they could not access it.

The site was shut off by Firefox, he said, but available around Google's Chrome browser.

"It seemed to work with Chrome but then a few seconds later, without having to click on anything, pop-ups proposed to appear," he said.

The rouge ethics closed down several of the programs Mr Mutton was using and stopped new ones being started.

"I visited the site and it compromised my machine," mentioned Mr Mutton.

While he was fighting to recover manage of his machine, the malware kicked off counterfeit pathogen alerts in pop-up windows. One window was a counterfeit safety scanner that claimed it had detected lots of not similar malware on the PC.

Mr Mutton mentioned his appurtenance fell plant notwithstanding being Bad ads

Analysis of the LSE homepage by Google's protected browsing scheme, that scans web pages for rouge code, found the site had been listed for "suspicious wake up 6 time(s) over the past 90 days".

The final time it detected rouge wake up on the site was on 27 February, the day Mr Mutton visited.

Of the 1112 pages that Google scanned on the LSE site over the final 90 days, 363 were found to be hosting malware. The rouge ethics it found enclosed scripting exploits and trojans.

Graham Cluley, comparison technology consultant at safety definite Sophos, said: "Our guess would be that it was the third-party promotion network running around the site that delivered the malware."

"This supposed 'malvertising' is large business for cyber criminals," mentioned Mr Cluley.

"If they are able to plant their unwholesome adverts in the streams being used by leading websites then it can expansion their attacks far and wide," he said.

While many sites rest on third-parties to give adverts, that can have its risks, mentioned Mr Cluley.

"Unfortunately when an infection does obtain by it's expected that the users will censure the website, not the ad network," he said.

No comments:

Post a Comment