Fake Adobe Flash Player update extension serves salacious spam ads

Share this article:
Users who believe they are infected with the malicious extension should remove it.
Users who believe they are infected with the malicious extension should remove it.

Security researchers are warning of a fake Adobe Flash Player update extension whose goal is to serve spam ads to victims.

The malicious plug-in, dubbed FlashPlayer11.safariextz, is being distributed from mostly pornographic websites, according to Jerome Segura of security firm Malwarebytes. Unsuspecting users are told they need to “install this update for Flash to view this video," but it's actually a malicious file.

The threat is "widespread," according to a spokeswoman for the company, which is monitoring the outbreak.

Once the bogus software is installed, it displays racy ads.

"For example, I visited PBSKids.org, a site for children to play games and watch their favorite characters, when all of a sudden a pornographic advertisement was displayed," Segura wrote in a blog post.

It's not just lewd ads being served, either. The malware – which does not affect Internet Explorer, but was spotted in Chrome, Safari and Firefox – also is capable of superimposing spam ads over legitimate ones.

"Online advertising is a billion-dollar industry, and everybody wants to have a piece of it," Segura wrote. "With such invasive adverts, cyber crooks are likely to generate a lot of views and even pay-per-clicks. If you believe you are seeing strange or inappropriate ads on the websites you regularly visit, it wouldn't hurt checking the extensions installed in your browser and removing the offending ones."

Share this article:

Sign up to our newsletters

More in News

Latest Citadel trick allows RDP access after malware's removal

Latest Citadel trick allows RDP access after malware's ...

Trusteer, an IBM company, said the new Citadel configuration was detected this month.

Cryptoblocker variant emerges, encryption differs from CryptoLocker

Trend Micro has detected a variant of CryptoLocker in the wild that relies on the advanced encryption standard.

Jimmy John's sandwich chain investigating possible breach

Some financial institutions have indicated that credit cards recently used at Jimmy John's locations have been used to make fraudulent purchases.