Menu
Plenty of fish, and exploits too, on dating website

Plenty of fish, and exploits too, on dating website

The Plenty of Fish online dating website served a malicious advertisement to visitors

Recent visitors to Plenty of Fish (pof.com), an online dating website with over 3 million daily active users, had their browsers redirected to exploits that installed malware.

The attack was launched through a malicious advertisement that was distributed through a third-party ad network, researchers from security firm Malwarebytes said in a blog post Thursday.

The malicious ad pointed to the Nuclear exploit kit, a Web-based attack tool that exploits known vulnerabilities in browsers and popular browser plug-ins like Flash Player, Java, Adobe Reader and Silverlight.

If the attack is successful, the tool installs malware programs on users' computers. The Malwarebytes researchers haven't captured the payload from the Plenty of Fish attack, but a malvertising campaign launched through the same ad server a day earlier distributed an online banking Trojan program known as Tinba.

"Given that the time frame of both attacks and that the ad network involved is the same, chances are high that pof[dot]com dropped that Trojan as well," the researchers said.

The server that distributed the malicious ad is ad.360yield.com and appears to be operated by a real-time advertising firm called Improve Digital that's headquartered in Amsterdam. The company did not immediately respond to a request for comment.

This attack does not mean that Plenty of Fish had its servers or systems compromised, like what recently happened to adult dating site Ashley Madison.

Malvertising attacks are the result of criminals tricking or hacking into advertising networks so they can display malicious ads on legitimate websites that use those networks.

This kind of attacks have been around for years, despite significant efforts by advertising companies to prevent them, and are quite dangerous because they are completely transparent to the victims. Users just browse to a known and trusted website and have their computers infected in the background.

Since exploit kits like Nuclear typically target known vulnerabilities, it's important to keep software programs, especially browser plug-ins, up to date. Running up-to-date antivirus products that could detect the exploit payload, even if the exploit is successful, is also very important.

Even if you've taken all these precautions, if you visited pof.com recently it's probably best to run a malware scan as soon as possible.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

Tight lines as Hooked on Lenovo catches up at Great Barrier Island

​Ingram Micro’s Hooked on Lenovo incentive programme recently rewarded 28 of New Zealand's top performing resellers with a full-on fishing trip at Great Barrier Island for the third year​ in a row.

Tight lines as Hooked on Lenovo catches up at Great Barrier Island
Inside the AWS Summit in Sydney

Inside the AWS Summit in Sydney

As the dust settles on the 2017 AWS Summit in Sydney, ARN looks back an action packed two-day event, covering global keynote presentations, 80 breakout sessions on the latest technology solutions, and channel focused tracks involving local cloud stories and insights.

Inside the AWS Summit in Sydney
Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day

Ingram Micro hosted its third annual Cure Kids Charity Golf Tournament at the North Shore Golf Club in Auckland. In total, 131 resellers, vendors and Ingram Micro suppliers enjoyed a round of golf consisting of challenges on each of the 18 sponsored holes, with Team Philips taking out the top honours.

Channel tees off on the North Shore as Ingram Micro hosts annual Cure Kids Charity golf day
Show Comments