Banning links from embedded browsers for security reasons
infosec

Banning links from embedded browsers for security reasons

Google has decided to ban the logins from embedded browsers since June of 2019. Why did he ...
Read More
infosec

Malicious AutoHotkey Scripts infect systems for spyware purposes

A new threat appears to have occurred, in which malicious hackers use AutoHotkey scripts to ...
Read More
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More
infosec

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More
infosec

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More
Latest Posts

A high visibility adult site poses a security risk

amateur content

Safety hazards

Computer security hazards have been discovered on the United States's popular pornographic website, of very high traffic.

These risks are due to a campaign malvertising, which uses Flash Player to exploit computing systems that do not have the latest version of the application.

Security researchers have found enough evidence of system infections originating from the xhamster [.] com, with the reason for an increase in attacks up to 1.500% lately. The security company who discovered the issue did not want to reveal the exact number of infections it recorded.

However, we can assume that a fairly large number of visitors to the page are infected, as it is quite popular, with 64 and 100 worldwide ranking in the United States, according to Alexa measurements. In addition, it is estimated that more than 500 million users visit the page on a monthly basis.

After several analyzes, the researchers revealed that the attack was drive-by download. Malwarebytes reports that the attackers invoked a simpler method, incorporating a new landing page and script, hosted in a broken ad network.

[alert variaation = »alert-info»] Researchers report that Flash scripts that exploit vulnerable systems go unnoticed by antivirus engines, according to VirusTotal. [/ alert]

At the time of its discovery, the security issue affected all versions of Flash Player prior to the 16.0.0.296 version running on any version of the Windows operating system and with any version of Internet Explorer and Mozilla Firefox. Google Chrome was not affected by all of this.

Malvertising attacks are common, especially on pornographic pages, due to the large number of visitors they attract on a daily basis. But this campaign, according to the researchers, is very risky and spreads fairly quickly. For this reason, they urge all users to immediately install the new Flash security updates, Internet Explorer and Chrome, which were released earlier in the week.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (SecNews.gr), as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *