Hanjuan EK’s ‘March Madness’ malvertising campaign

  • 24 March 2015
  • 0 replies
  • 150 views

Userlevel 7
Badge +54
March 24, 2015 | BY Jérôme Segura
 
The lesser known and stealthy Hanjuan Exploit Kit, which for almost two months was using a  Flash Player zero-day (CVE-2015-0313) to infect unsuspecting users, has been quite active again during the past couple of weeks.
The current malvertising campaign stems from the Engage:BDR ad network and has affected several high profile sites:
  • nydailynews.com
  • metacafe.com
A seemingly innocent looking ad side-loads a malicious URL with absolutely no user interaction (no click required).
 


People surfing with Adobe Flash Player 16.0.0.296 are vulnerable to a drive-by download attack that happens within seconds in the background.
 
Full Article

0 replies

Be the first to reply!

Reply