New York Times tricked into serving scareware ad
IDG News Service - Scammers tricked the New York Times' Digital Advertising department into placing a malicious ad for fake antivirus software on the NYTimes.com Web site over the weekend, the company confirmed Monday.
The newspaper had warned of the scam advertisement Sunday, after receiving about 100 e-mails from concerned readers.
According to the Times, the scammers initially claimed to be Internet phone provider Vonage, and had placed what appeared to be legitimate Vonage ads on the Web site. However, sometime over the weekend, they switched these ads for aggressive pop-up advertisements that tried to trick victims into thinking that their computers were infected.
The point of the scam was to sell worried computer users a product called Personal Antivirus, a fake "scareware" product that bombards victims with popup ads until they either hand over their credit card information or somehow manage to remove the program.
When the complaints started pouring in, the Times first suspected that the ad had been unauthorized, and pulled third-party advertisements from the site. But on Monday spokeswoman Diane McNulty confirmed that the ad had been submitted directly to the company's online ad department.
"The culprit masqueraded as a national advertiser and provided seemingly legitimate product advertising for a week," she said via email. "Over the weekend, the ad being served up was switched so that an intrusive message, claiming to be a virus warning from the reader's computer, appeared. "
Technology executive Troy Davis was hit with the ad after he clicked on a Times story about Dubai on Saturday night. After his antivirus software warned him not to visit the article, he performed an analysis of the site and discovered that the Times was allowing advertisers to embed an HTML element known as an iframe into their advertisements. This gave the criminals a way to include embedded Web pages in their copy that could be hosted on a completely different server, outside of the control of the Times.
It was, of course, all just a fake.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts