A number of high-profile and very high-traffic websites such as The New York Times (NYT), BBC, AOL, MSN, the NFL and more have all been serving up malicious adverts to unsuspecting users that ultimately results in files being held to ransom by the malware, according to Malwarebytes.
Malicious ads making their way onto websites via ad networks used to be a far more common occurence but most ad networks from company’s like Google have gotten far better at rooting out the bad from the good.
New York, meet the world’s tech scene
5,000 Tech leaders are coming to NYC this November to learn and do business. This is your chance to join them.
“Out of the blue on the weekend, we witnessed a huge spike in malicious activity emanating out of two suspicious domains. Not only were there a lot of events, but they also included some very high profile publishers, which is something we haven’t seen in a while,” the company said.
It looks like the ads weren’t restricted to coming via Google’s ad network either – AOL, AppNexus and Rubicon’s networks were also named in the report.
Once a user has been infected, they’re then redirected to a page hosting the malware exploit kits, which ultimately lead to your files being held ransom in exchange for a payment – often requested via bitcoin due to its relative anonymity. In this attack, Malwarebytes says that the Angler exploit kit is used in many instances.
The news won’t help publishers win any favors in the adblocking debate, however. Not only are ads considered to be essentially spam by many people, they’re also now (once again) compromising the security of users.