On July 28, popular website Yahoo! became the one of the latest websites targeted by malicious ads that redirect to the Angler Exploit Kit, which attempts to take advantages of security holes in Adobe Flash. Yahoo! has an estimated 6.9 billion visitors per month.
From The New York Times:
The attack, which started on July 28, was the latest in a string that have exploited Internet advertising networks, which are designed to reach millions of people online. It also highlighted growing anxiety over a much-used graphics program called Adobe Flash, which has a history of security issues that have irked developers at Silicon Valley companies.
Malwarebytes and Business Insider provide more information about this specific incident.
Yahoo! became aware of the attack on August 3 and has released a statement indicating their team has "taken action" (shortened):
"Yahoo is committed to ensuring that both our advertisers and users have a safe and reliable experience. As soon as we learned of this issue, our team took action and will continue to investigate this issue.... We'll continue to ensure the quality and safety of our ads through our automated testing and through the SafeFrame working group...."
(Score: 5, Interesting) by hankwang on Wednesday August 05 2015, @05:15AM
Can someone explain how tbis works? I have always assumed that an advertiser provides the graphics and target URL if the ad is clicked, and that the ad network wraps it in a javascript/Flash template.
Do the ad network allow the advertiser to provide their own Flash scripts? If that is the case, then I'm baffled. Or were the ad servers compromised in some other way?
Avantslash: SoylentNews for mobile [avantslash.org]