Feeds

Scareware package planted in ITV.com ads

Pop-up programme peril

Intelligent flash storage arrays

Updated again Users visiting the website of UK broadcaster ITV earlier this week risked exposure to a scareware package. Malware-laced banner ads that lead to download sites for the Cleanator scare package have also been served up on the Radio Times website.

Radio Times confirmed that it removed the offending ad late Wednesday morning, following initial reports of the problem on Tuesday. ITV said on Friday that it had "identified and blocked the attack". The broadcast station promised to work with its ad networks to ensure betterprotection for its viewers in future.

Cleanator is a rogue security program that shows false warning messages and misleading scan results in a ruse designed to scare punters into purchasing a "full" version of the package. Aggressive advertising tactics - including the use of Trojan downloaders - are used to distribute the software. Several security vendors (including Sophos (here), CA (here) and EMSI (here)) list Cleanator as a pest.

The attack on both ITV and Radio Times was not made from either site directly, but via malicious scripts by way of third party adverts. Other as yet unidentified sites may also be affected.

The presence of tainted ads on the ITV website was brought to our attention by Reg reader Gavin, who was prompted to install Cleanator after watching a video clip on the ITV website. "After wanting to watch a video, I was informed I had no DRM software and that I needed to install it. I reluctantly clicked yes only to be given this prompt that asks me to install 'Cleanator'," he reports.

Preliminary analysis by anti-virus experts at Sophos suggests that a PHP redirect to an Cleanator affiliate site was injected into advert traffic served up by ITV.com via third party agencies. Malware is thought to feature in the attack.

"One of ITV's affiliated advertisement sites contained a link to Gida-B. Gida-B is malicious shockwave file that in turn loads another copy of itself which loads a script to redirect you to a Cleanator site," explained Graham Cluley, senior technology consultant at Sophos.

Once they land on the Cleanator affiliate site, users are liable to get stuck in a pop-up loop that's difficult to escape, as explained in a blog posting (containing screenshots) by Sophos here.

Sophos reckons the people behind the attack are the same group who recently punted the Mac Sweeper scareware package, based on similarities between the two attacks. If the user browsing the tainted ads is on a Mac, they get redirected to the Mac Sweeper website. ®

Updated

Reports are coming in that Cleanator infections have also cropped up on MSN UK and the UK Press Gazette.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.