Fake Adobe Flash Player update extension serves salacious spam ads

Share this article:
Users who believe they are infected with the malicious extension should remove it.
Users who believe they are infected with the malicious extension should remove it.

Security researchers are warning of a fake Adobe Flash Player update extension whose goal is to serve spam ads to victims.

The malicious plug-in, dubbed FlashPlayer11.safariextz, is being distributed from mostly pornographic websites, according to Jerome Segura of security firm Malwarebytes. Unsuspecting users are told they need to “install this update for Flash to view this video," but it's actually a malicious file.

The threat is "widespread," according to a spokeswoman for the company, which is monitoring the outbreak.

Once the bogus software is installed, it displays racy ads.

"For example, I visited PBSKids.org, a site for children to play games and watch their favorite characters, when all of a sudden a pornographic advertisement was displayed," Segura wrote in a blog post.

It's not just lewd ads being served, either. The malware – which does not affect Internet Explorer, but was spotted in Chrome, Safari and Firefox – also is capable of superimposing spam ads over legitimate ones.

"Online advertising is a billion-dollar industry, and everybody wants to have a piece of it," Segura wrote. "With such invasive adverts, cyber crooks are likely to generate a lot of views and even pay-per-clicks. If you believe you are seeing strange or inappropriate ads on the websites you regularly visit, it wouldn't hurt checking the extensions installed in your browser and removing the offending ones."

Share this article:

Sign up to our newsletters

More in News

In Cisco probe, misuse or compromise spotted on all firms' networks

In Cisco probe, misuse or compromise spotted on ...

Cisco analyzed the business networks of 30 multinational companies last year, and revealed the findings in its 2014 Annual Security Report.

Fareit trojan observed spreading Necurs, Zbot and CryptoLocker

The Necurs and Zbot trojans, as well as CryptoLocker ransomware, has been observed by researchers as being spread through another trojan, known as Fareit.

Post Heartbleed, tech giants join initiative to bolster open source

Post Heartbleed, tech giants join initiative to bolster ...

The newly formed Core Infrastructure Initiative, created to boost under-funded open source projects, will tackle OpenSSL first.