TechWeek Europe has reported an advertising attack which ran for almost three weeks on major websites such as eBay UK, The Drudge Report and TalkTalk, and advertising networks including DoubleClick’s EMEA network. The campaign used the Angler Exploit Kit to carry out fraud schemes or install ransomware on the victim’s system. Devin Redmond, vice president & general manager at Proofpoint commented on the advertising attack that hits visitors.

[su_note note_color=”#ffffcc” text_color=”#00000″]Devin Redmond, Vice President & General Manager at Proofpoint :

“We see the bad guys taking it up a notch with social media. What’s occurring now is that in addition to jumping on websites using ad networks, groups are using social media sites as another outlet to drive traffic to malicious sites and payloads. They are preying on the audiences of major social sites and, in an interesting twist, are using the trending topic of the site instead of a general ad to capture people. For example, they will jump on the social account for a trending movie and offer access to exclusive content or special screenings and when the user clicks on a shortened link they can be phished or infected from there. Enterprise brands can actually prevent this and protect their customers by using remediation technologies and processes to keep their social accounts and sites clean.”[/su_note][su_box title=”About Proofpoint” style=”noise” box_color=”#336588″]proofpoint_logoProofpoint Inc. (NASDAQ:PFPT) is a leading security-as-a-service provider that focuses on cloud-based solutions for threat protection, compliance, archiving & governance, and secure communications. Organizations around the world depend on Proofpoint’s expertise, patented technologies and on-demand delivery system to protect against phishing, malware and spam, safeguard privacy, encrypt sensitive information, and archive and govern messages and critical enterprise information.[/su_box]

Experts Comments

Stay Tuned! Our Information Security Experts Community is responding .....

What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.