Slew of Fish users hooked, lined and sinkered, TheINQUIRER
Slew of Fish users hooked, lined and sinkered
DEAR Slew OF FISH (PoF) users, please sit down. We have something to tell you. We have a problem, and it is not us, it is you.
Actually, it is none of these. It is those shady hackers who cannot help but break into systems and make merry who are the problem, and it is because of them that a relationship inbetween lone person and dating site might be violating down.
It’s not a phishing attack – that would have made this a much more pun-filled practice – but it is more of an infection, and not the sore, scratchy kind. The rock hard and its users have suffered from misinformation and misdirection, and we aren’t talking about members and their individual profiles. We are talking about malvertising.
Swines have attempted to get inbetween cupid and his arrow and have, we understand, managed to spike the weapon with malware. PoF has some ninety million users, presumably helped by the fact that it is a free to join dating site, and some Three.6 million people fishing through its pages every day.
Security rock-hard Malwarebytes said that it has spotted the bad use of a link shortener on the PoF website that can be exploited to place malware on victims’ computers via poisoned adverts. Malwarebytes has contacted PoF about all of this and it is waiting for a response. Same here.
The security company explained that there is evidence of at least one banking trojan, and probable problems for end users.
"We detected a malvertising attack on popular dating site PoF which draws over three million daily users. The attack chain uses the Google URL shortener goo.gl as an intermediary to geyser the Nuclear exploit kit. Malwarebytes Anti-Exploit users were protected against this attack," the hard said.
What with Ashley Madison, this is all adding up to a bad time for daters and people who like to pretend that they are working late in significant meetings. Dating sites are being picked apart like dates on the morning after, and we are getting to learn a lot more about their members than we ever desired to ask.
Security specialist Mark James from ESET ran a cold shower for worried users and told them they should switch their passwords and look for suspicious activity in their financial statements.
"Malvertising has been around for a while and is often fairly successful in its attack campaign because of the lack of interaction needed by the individual infected," he said.
"It’s not reliant on unpatched servers or vulnerabilities or the reputation of the affected site. It could be a high-profile or an under-the-radar website and has the capability to spread through thousands of users before being found and stopped.
"Ensure your operating systems and applications are all updated and patched and check your financial accounts regularly. Look out for any transactions you’re not sure of, however petite they may seem, and if possible switch any financial banking passwords instantly.
"Switching a password takes minutes. Having to deal with recovering money from a hacked account can take months to get it all resolved and sorted. It’s a no brainer."
James also suggested that PoF should get a better ad server. µ
Slew of Fish users hooked, lined and sinkered, TheINQUIRER
Slew of Fish users hooked, lined and sinkered
DEAR Slew OF FISH (PoF) users, please sit down. We have something to tell you. We have a problem, and it is not us, it is you.
Actually, it is none of these. It is those shady hackers who cannot help but break into systems and make merry who are the problem, and it is because of them that a relationship inbetween lone person and dating site might be violating down.
It’s not a phishing attack – that would have made this a much more pun-filled practice – but it is more of an infection, and not the sore, scratchy kind. The hard and its users have suffered from misinformation and misdirection, and we aren’t talking about members and their private profiles. We are talking about malvertising.
Swines have attempted to get inbetween cupid and his arrow and have, we understand, managed to spike the weapon with malware. PoF has some ninety million users, presumably helped by the fact that it is a free to join dating site, and some Three.6 million people fishing through its pages every day.
Security stiff Malwarebytes said that it has spotted the bad use of a link shortener on the PoF website that can be exploited to place malware on victims’ computers via poisoned adverts. Malwarebytes has contacted PoF about all of this and it is waiting for a response. Same here.
The security company explained that there is evidence of at least one banking trojan, and probable problems for end users.
"We detected a malvertising attack on popular dating site PoF which draws over three million daily users. The attack chain uses the Google URL shortener goo.gl as an intermediary to geyser the Nuclear exploit kit. Malwarebytes Anti-Exploit users were protected against this attack," the hard said.
What with Ashley Madison, this is all adding up to a bad time for daters and people who like to pretend that they are working late in significant meetings. Dating sites are being picked apart like dates on the morning after, and we are getting to learn a lot more about their members than we ever dreamed to ask.
Security specialist Mark James from ESET ran a cold shower for worried users and told them they should switch their passwords and look for suspicious activity in their financial statements.
"Malvertising has been around for a while and is often fairly successful in its attack campaign because of the lack of interaction needed by the individual infected," he said.
"It’s not reliant on unpatched servers or vulnerabilities or the reputation of the affected site. It could be a high-profile or an under-the-radar website and has the capability to spread through thousands of users before being found and stopped.
"Ensure your operating systems and applications are all updated and patched and check your financial accounts regularly. Look out for any transactions you’re not sure of, however puny they may seem, and if possible switch any financial banking passwords instantly.
"Switching a password takes minutes. Having to deal with recovering money from a hacked account can take months to get it all resolved and sorted. It’s a no brainer."
James also suggested that PoF should get a better ad server. µ
Slew of Fish users hooked, lined and sinkered, TheINQUIRER
Slew of Fish users hooked, lined and sinkered
DEAR Slew OF FISH (PoF) users, please sit down. We have something to tell you. We have a problem, and it is not us, it is you.
Actually, it is none of these. It is those shady hackers who cannot help but break into systems and make merry who are the problem, and it is because of them that a relationship inbetween lone person and dating site might be cracking down.
It’s not a phishing attack – that would have made this a much more pun-filled practice – but it is more of an infection, and not the sore, scratchy kind. The rigid and its users have suffered from misinformation and misdirection, and we aren’t talking about members and their private profiles. We are talking about malvertising.
Swines have attempted to get inbetween cupid and his arrow and have, we understand, managed to spike the weapon with malware. PoF has some ninety million users, presumably helped by the fact that it is a free to join dating site, and some Trio.6 million people fishing through its pages every day.
Security hard Malwarebytes said that it has spotted the bad use of a link shortener on the PoF website that can be exploited to place malware on victims’ computers via poisoned adverts. Malwarebytes has contacted PoF about all of this and it is waiting for a response. Same here.
The security company explained that there is evidence of at least one banking trojan, and probable problems for end users.
"We detected a malvertising attack on popular dating site PoF which draws over three million daily users. The attack chain uses the Google URL shortener goo.gl as an intermediary to blast the Nuclear exploit kit. Malwarebytes Anti-Exploit users were protected against this attack," the hard said.
What with Ashley Madison, this is all adding up to a bad time for daters and people who like to pretend that they are working late in significant meetings. Dating sites are being picked apart like dates on the morning after, and we are getting to learn a lot more about their members than we ever desired to ask.
Security specialist Mark James from ESET ran a cold shower for worried users and told them they should switch their passwords and look for suspicious activity in their financial statements.
"Malvertising has been around for a while and is often fairly successful in its attack campaign because of the lack of interaction needed by the individual infected," he said.
"It’s not reliant on unpatched servers or vulnerabilities or the reputation of the affected site. It could be a high-profile or an under-the-radar website and has the capability to spread through thousands of users before being found and stopped.
"Ensure your operating systems and applications are all updated and patched and check your financial accounts regularly. Look out for any transactions you’re not sure of, however petite they may seem, and if possible switch any financial banking passwords instantly.
"Switching a password takes minutes. Having to deal with recovering money from a hacked account can take months to get it all resolved and sorted. It’s a no brainer."
James also suggested that PoF should get a better ad server. µ