{"id":8497,"date":"2015-07-28T11:15:31","date_gmt":"2015-07-28T15:15:31","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=8497"},"modified":"2015-07-28T11:15:31","modified_gmt":"2015-07-28T15:15:31","slug":"over-10-million-people-possibly-exposed-to-malicious-ads-rigged-with-exploit-kits","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2015\/07\/28\/over-10-million-people-possibly-exposed-to-malicious-ads-rigged-with-exploit-kits\/","title":{"rendered":"Over 10 million people possibly exposed to malicious ads rigged with exploit kits"},"content":{"rendered":"<p>Upwards of 10 million people may have visited websites carrying malicious advertisements in the last ten days, possibly infecting their computers with malware, according to computer security company Cyphort.<\/p>\n<p>For the past month, Cyphort has been tracking various malicious advertisement campaigns, which involve duping online advertising providers into distributing their malicious ads.<\/p>\n<p>If someone views a malicious advertisement, it can cause their browser to be automatically redirected to another website that attacks their computer.<\/p>\n<p>Nick Bilogorskiy, director of security research at Cyphort, wrote that the company has discovered over the last week a number of highly trafficked websites that are still carrying malicious ads.<\/p>\n<p>The malicious ads redirected people to websites that were rigged with the Angler exploit kit. An exploit kit is a software package that probes a computer for software vulnerabilities in order to deliver malware.<\/p>\n<p>As with previous attacks observed by Cyphort, the redirection code planted in the malicious advertisements uses SSL\/TLS (Secure Sockets Layer\/Transport Layer Security) encryption, which makes it harder for researchers to figure how users are bounced from the original webpage they were viewing to one hosting an exploit kit.<\/p>\n<p>The malicious ads were delivered to the website publishers by an online marketing company called E-planning. Bilogorskiy wrote that Cyphort had contacted the company, which was working to fix the problem.<\/p>\n<p>Online advertising agencies have been battling to keep miscreants out of their networks, but it\u2019s a hard fight. Even if an ad network scans submitted ads for malicious behavior, hackers often substitute the ads with different ones at a later time or rig the ads to pass initial security checks<\/p>\n<p>via <a href=\"http:\/\/www.pcworld.com\/article\/2953452\/security\/over-10-million-web-surfers-possibly-exposed-to-malvertising.html\" target=\"_blank\">Over 10 million people possibly exposed to malicious ads rigged with exploit kits | PCWorld<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Upwards of 10 million people may have visited websites carrying malicious advertisements in the last ten days, possibly infecting their [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[7,10],"tags":[342,653,655],"class_list":["post-8497","post","type-post","status-publish","format-standard","hentry","category-security","category-technology","tag-exploits","tag-malicious-ads","tag-malware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-2d3","jetpack-related-posts":[{"id":9339,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/05\/14\/this-week-in-tech-666-leave-john-legend-um-alone\/","url_meta":{"origin":8497,"position":0},"title":"This Week in Tech 666: Leave John Legend, Um, Alone!","author":"NCCT","date":"May 14, 2018","format":false,"excerpt":"https:\/\/youtu.be\/U_aUjM9MNhk ZTE shuts down, but help is on the way from an unlikely tweet. Google I\/O shows off creepy robocallers and helpful directions. Microsoft Build brings Cortana\/Alexa integration and the return of Kinect. Congress releases over 3500 Russian Facebook election ads. Cambridge Analytica \"dies,\" is reborn as Emerdata. Robocaller gets\u2026","rel":"","context":"In &quot;Microsoft&quot;","block_context":{"text":"Microsoft","link":"https:\/\/nccomputertech.com\/techtalk\/category\/microsoft\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/U_aUjM9MNhk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9430,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/05\/the-prosecco-experience-this-week-in-tech-691\/","url_meta":{"origin":8497,"position":1},"title":"The Prosecco Experience &#8211; This Week in Tech 691","author":"NCCT","date":"November 5, 2018","format":false,"excerpt":"https:\/\/youtu.be\/9Pm9vDm1-sg Apple\u2019s new Macs and iPads, CIA\u2019s not-so-secret websites, Twitter voter suppression, and more. -- Apple announces new MacBook Air and Mac Mini, then blows them both away with its new iPad Pro. -- Apple will no longer tell us how many iPhones it sells. -- How to kill an\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/9Pm9vDm1-sg\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9295,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/02\/05\/this-week-in-tech-652-were-all-out-of-kidneys\/","url_meta":{"origin":8497,"position":2},"title":"This Week in Tech 652: We&#8217;re All Out of Kidneys","author":"NCCT","date":"February 5, 2018","format":false,"excerpt":"https:\/\/youtu.be\/aUpYOMKq4iQ Tech ads in the Superbowl. Elon Musk's \"Not-a-Flamethrower.\" Apple, Google, and Amazon quarterly results. What are Amazon's health plans? What game company will Microsoft buy next?","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/aUpYOMKq4iQ\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9930,"url":"https:\/\/nccomputertech.com\/techtalk\/2025\/05\/16\/fbi-says-toss-your-old-router\/","url_meta":{"origin":8497,"position":3},"title":"FBI Says Toss Your Old Router","author":"NCCT","date":"May 16, 2025","format":false,"excerpt":"https:\/\/youtu.be\/scR199zRjvA On Security Now, Steve talks about the FBI's suggestion that we should be tossing out our old routers.","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/scR199zRjvA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9343,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/05\/27\/this-week-in-tech-668-how-many-cups-in-a-stone\/","url_meta":{"origin":8497,"position":4},"title":"This Week in Tech 668: How Many Cups in a Stone?","author":"NCCT","date":"May 27, 2018","format":false,"excerpt":"https:\/\/youtu.be\/i1oqaFyVcQ0 --The FBI wants you to reboot your router right now. FBI agents have gained control of a huge Russian botnet. If your router is affected you just need to reboot it. --Facebook and Russian ads - how should government react in the age of cyber warfare? --Amazon sells facial\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/i1oqaFyVcQ0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9655,"url":"https:\/\/nccomputertech.com\/techtalk\/2021\/03\/09\/fuquay-varina-and-holly-springs-computer-repair\/","url_meta":{"origin":8497,"position":5},"title":"Fuquay Varina and Holly Springs Computer Repair","author":"NCCT","date":"March 9, 2021","format":false,"excerpt":"Welcome to our blog. NC Computer Tech services Fuquay Varina, Holly Springs, and surrounding NC areas. We offer prompt, professional, courteous service with over twenty years of experience dealing with residential and small business clients offering them solutions and fixing their computer and network issues at reasonable rates. Our services\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/8497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=8497"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/8497\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=8497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=8497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=8497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}