Computer security threats were discovered on a popular, highly-visited US pornographic website.
These risks are due to a campaign malvertising, which utilizes Flash Player, in order to exploit computer systems that do not have the latest version of the application.
Security researchers have found enough evidence of system infections originating from the xhamster [.] com, talking about an increase in attacks of up to 1.500% lately. The security company that discovered the issue did not want to reveal the exact number of infections it recorded.
However, we can assume that a fairly large number of site visitors have been infected, as it is quite popular, with a global ranking of 64 and 100 in the United States, according to measurements by Alexa. In addition, it is estimated that more than 500 million users visit the site on a monthly basis.
After several analyzes, the investigators revealed that the attack was a drive-by download. Malwarebytes reports that the attackers invoked a simpler method, incorporating a new landing page and script, which were hosted on a compromised ad network.
[alert variation = ”alert-info”] Researchers report that Flash scripts that exploit vulnerable systems go unnoticed by antivirus engines, according to VirusTotal. [/ alert]
At the time of its discovery, the security issue affected all versions of Flash Player prior to version 22.214.171.1246, which runs on any version of the Windows operating system and any version of Internet Explorer and Mozilla Firefox. Google Chrome was not affected by all of this.
Malvertising attacks are commonplace, especially on pornographic sites, because of the large number of visitors they attract on a daily basis. However, according to the researchers, this campaign is very dangerous and is spreading quite fast. For this reason they urge all users to immediately install the new security updates for Flash, Internet Explorer and Chrome, which were released earlier in the week.