Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

Regular domains beat smut sites at hosting malware

99 to 1, study finds

New research pours scorn on the comforting but erroneous belief that Windows surfers who avoid smut and wares on the web are likely to avoid exposure to malware.

A study by free anti-virus firm Avast found 99 infected legitimate domains for every infected adult web site. In the UK, Avast found that more infected domains contained the word "London" (such as the blog section of http://kensington-london-hotels.co.uk) than the word "sex". Among the domains labelled as infected by Avast was the smart phones section of the Vodafone UK website. The mobile phone operator's site contained a malicious JavaScript redirect script that attempted to take advantage of an unpatched Windows Help and Support Centre flaw (CVE-2010-1885) to infect the machines of visiting surfers.

HTML files from sub-domain blackberry.vodafone.co.uk still contain malicious code at the time of writing but point to a site containing the attack payload site that has been pulled offline.

"Users browsing Vodafone domain should be safe - until new hack/updated hack will be performed," Avast researcher Miloslav Korenko told The Reg. "This may happen in the same way as the first hack.

"Of course, the Blackberry section of Vodafone.co.uk website needs to be cleaned as well - to prevent future attack similar to this one."

We have passed on details of the problem to Vodafone and will update this story as and when we get a response.

The type of attack against Vodafone is typical of one in five of the website infections identified by Avast. The anti-virus firm's results were culled from anonymous security incident logs submitted by users of its security software since the middle of last year. Data submitted includes information on the malware type and visited website, from which Avast draws its conclusions that infection of regular legitimate websites is a far more common cause of problems than visits to smut sites.

Infected sites recorded by the study include Brazilian software download site Baixaki and a variety of small business websites in Germany. Avast said a declining rate of the infections on ‘adult’ websites during its study emerged as a clear trend.

"We are not recommending people to start searching for erotic content but the statistics are clear - for every infected adult domain we identify there are 99 others with perfectly legitimate content that are also infected," commented Avast CTO Ondrej Vlcek. ®

Sponsored: Legacy Modernization: Finding Your Way With Low-Code

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER


Biting the hand that feeds IT © 1998–2020