Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Saturday October 14 2017, @03:10AM   Printer-friendly
from the Alfred-E.-Newman-award-winners dept.

A story at Ars Technica reports two credit reporting agencies' web sites are redirecting users to sites trying to distribute malware — Transunion's Central America site and Equifax's site:

As Ars reported late Wednesday night, a portion of Equifax's website was redirecting visitors to a page that was delivering fraudulent Adobe Flash updates. When clicked, the files infected visitors' computers with adware that was detected by only three of 65 antivirus providers. On Thursday afternoon, Equifax officials said the mishap was the result of a third-party service Equifax was using to collect website-performance data and that the "vendor's code running on an Equifax website was serving malicious content." Equifax initially shut down the affected portion of its site, but the company has since restored it after removing the malicious content.

Now, Malwarebytes security researcher Jérôme Segura says he was able to repeatedly reproduce a similar chain of fraudulent redirects when he pointed his browser to the transunioncentroamerica.com site. On some occasions, the final link in the chain would push a fake Flash update. In other cases, it delivered an exploit kit that tried to infect computers with unpatched browsers or browser plugins. The attack chain remained active at the time this post was going live. Segura published this blog post shortly after this article went live on Ars.

"This is not something users want to have," Segura told Ars.

The common thread tying the affected Equifax and TransUnion pages is that both hosted fireclick.js, a JavaScript file that appears to invoke the service serving the malicious content. When called, fireclick.js pulls content from a long chain of pages, starting with those hosted by akamai.com, sitestats.com, and ostats.net. Depending on the visitors' IP address, browsers ultimately wind up visiting pages that deliver a fake survey, a fake Flash update, or an exploit kit.

Segura believes ostats.net is the link in the chain where things turn bad, but he has yet to confirm that.

I run with NoScript, AdBlock Lattitude, and uBlock Origin installed in my browser. I'll try allowing three, at most four, remote sites to get to content, otherwise I'll go somewhere else. The SoylentNews.org web site is coded so that users need not run even a single line of Javascript.

Additional coverage on Politico.com


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by jasassin on Saturday October 14 2017, @08:23AM (4 children)

    by jasassin (3566) <jasassin@gmail.com> on Saturday October 14 2017, @08:23AM (#582211) Homepage Journal

    Why doesn't somebody sue these assholes?

    --
    jasassin@gmail.com GPG Key ID: 0xE6462C68A9A3DB5A
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 5, Informative) by takyon on Saturday October 14 2017, @08:39AM (2 children)

    by takyon (881) <takyonNO@SPAMsoylentnews.org> on Saturday October 14 2017, @08:39AM (#582214) Journal

    Are You an Equifax Breach Victim? You Could Give Up Right to Sue to Find Out [soylentnews.org]

    (not a full answer to your question, but ain't that something)

    --
    [SIG] 10/28/2017: Soylent Upgrade v14 [soylentnews.org]
    • (Score: 2) by jasassin on Saturday October 14 2017, @09:11AM

      by jasassin (3566) <jasassin@gmail.com> on Saturday October 14 2017, @09:11AM (#582222) Homepage Journal

      Things that make you go hmmm...

      --
      jasassin@gmail.com GPG Key ID: 0xE6462C68A9A3DB5A
    • (Score: 3, Informative) by SrLnclt on Saturday October 14 2017, @02:39PM

      by SrLnclt (1473) on Saturday October 14 2017, @02:39PM (#582284)

      From the Experian Data Breach FAQ [equifaxsecurity2017.com] (under the Complimentary TrustedID Premier Product):

      Q: "Do the TrustedID and Equifax Terms of Use limit my options related to the cyber security incident?"
      A: "To confirm, enrolling in the free credit file monitoring and identity theft protection products that we are offering as part of this cybersecurity incident does not prohibit consumers from taking legal action. We have already removed that language from the Terms of Use on the site www.equifaxsecurity2017.com. The Terms of Use on www.equifax.com do not apply to the TrustedID Premier product being offered to consumers as a result of the cybersecurity incident. Again, to be as clear as possible, we will not apply any arbitration clause or class action waiver against consumers for claims related to the free products offered in response to the cybersecurity incident or for claims related to the cybersecurity incident itself.

      Q: "If I enrolled in TrustedID Premier prior to the Terms of Use change, what Terms of Use apply?"
      A: The prior Terms of Use will not apply to any consumers who have enrolled in TrustedID Premier, regardless of when they enrolled. In other words, even if a consumer enrolled prior to the change to the Terms of Use, the revised Terms of Use will apply to that consumer."

  • (Score: 3, Touché) by fritsd on Saturday October 14 2017, @02:15PM

    by fritsd (4586) on Saturday October 14 2017, @02:15PM (#582275) Journal

    Sorry, Equifax just re-directed you to a malware website that said: "I hereby declare that I am in full agreement with Equifax' terms and conditions, and have no need to sue them, now or ever".

    And when you clicked on the cross on the top right corner it clicked on the "I accept" button.