02-03-2014 04:22 PM
Video shows how drive-by attacks turn healthy paranoia against their victims.
Malware that masquerades as legitimate antivirus programs is one of the more insidious threats to plague people browsing websites. In many cases, attackers rely on simple text and graphics to trick visitors into thinking they're on the verge of a successful drive-by attack and deliver the warning under the guise of a trusted security application. People who fall for the ruse by following the advice presented in the advisory end up infecting themselves.
A recently captured video of one of these attacks in progress demonstrates why they continue to work—at least on less-experienced users who, despite their lack of savvy, know enough to be wary of online attacks. Shortly after visiting a legitimate site, the computer presents a window carrying the name of a well-known security application, in this case Microsoft Security Essentials. The window provides a plausible warning and recommends the user take immediate action to head off imminent infection. The video was shot by researchers from security firm Invincea as they browsed to the main page of Dailymotion.com.
As convincing as the attacks are to some, the video makes clear that these scams aren't usually hard to spot by people with a small amount of training. Malware warnings, for instance, should never require a user to install an executable file, as the warning in the video does. Legitimate malware warnings will also never be delivered in a browser window and should be generated only by anti-malware programs already installed. When in doubt, users who receive malware warnings should close the browser altogether and see if the pop-up window persists. Opening an antivirus program from the Windows start menu and running a scan from there is also a good move.
The advice will likely strike some readers as obvious. But for the Aunt Mildreds and Uncle Ernests of the world who are still new to the Internet—or possibly a more seasoned Internet user who is in a rush—the Invincea video may be useful.
02-03-2014 06:59 PM
Thanks Jeff and for the one's that use WSA would know to see it as we wouldn't have Microsoft Security Essentials turn on or even have it installed.
Webroot® SecureAnywhere™ Internet Security Complete Beta Tester v220.127.116.11 on my main system Alienware 17R2, Windows 10 Enterprise x64 (Build 10586) & HTC One M8 Android Lollipop 5.0.1 Phone v18.104.22.16800.
02-04-2014 06:41 AM
02-04-2014 11:01 AM
Here you are @CommanderShran this is what I have found, the relevant part is in bold, I hope it is what you are looking for.
Malicious Ads on DailyMotion Redirect to Fake AV Attack
Video-sharing site DailyMotion, one of the most popular destinations on the Web, is in the throes of an attack where it is serving malicious ads redirecting users to a fake AV scam.
Security firm Invincea reported the issue to the website, and as of 4 p.m. ET, DailyMotion was still serving the fake AV malware.
This is the second malvertising attack reported this week. Earlier, Yahoo sites in Europe were serving ads that dropped an iframe sending users to domains hosting the Magnitude exploit kit, which then seeded victims with a host of financial malware.
DailyMotion attracts 17 million monthly visitors and is the 95th-ranked website according to Alexa.
Invincea said that the malicious ads redirect to a third-party domain in Poland called webantivirusprorh[.]pl (93[.]115[.]82[.[246). According to VirusTotal, 10 of 47 antivirus products detect the threat; most detect it as a variant of the Graftor Trojan. The initial redirect, Invincea said, is loaded via engine[.]adzerk[.]net.
When the user lands on the DailyMotion home page, an invisible iframe redirects to the scam which warns the user of a critical process that must be cleaned to prevent system damage. The victim is then presented with a dialog box that offers to clean the computer of the problem. If the user agrees, they’re asked to run a file which is the malicious executable.