1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

FireEye: Forbes.com served malicious ads to visitors

Discussion in 'CSO' started by RSS, Sep 22, 2015.

  1. RSS

    RSS New Member Member

    In a blog post, researchers from FireEye have outlined a malvertising campaign that was running on Forbes.com earlier this month, which led visitors to landing pages ran by the Neutrino and Angler exploit kits.

    The attacks were triggered on a handful of articles, but the logs released by FireEye show that none of them were current.

    Once the article was loaded, calls to the ad itself would load a JS file, which contained an iframe that redirected the user to the selected exploit kit.

    At first, the Neutrino kit was the primary source of delivered malware (after exploiting Flash vulnerabilities), but additional investigation discovered the Angler exploit kit being used as well.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page