



Date:07/11/16
The Google Advertising detected malicious campaign aimed at Mac users. This is reported by experts from research firm Cylance.
According to experts, the fraudsters have acquired in AdWords advertising top places on request «Google Chrome», and the announcement is supposed to www.google.com/chrome. In fact, advertising sends users at googlechromelive.com, where the fake download page is located.
“Then a malicious download link leads the user to the macOS ttb.mysofteir.com sites, servextrx.com and www.bundlesconceptssend.com, which eventually is loaded virus file FLVPlayer.dmg», – experts say.
Whenever your hash malware changes that complicate its detection and tracking. Experts point out that Windows-based PCs users are theoretically at risk, as in their case, there is a redirect to admin.myfilessoft.com. Currently, the site displays an error due to a DNS failure, however, attackers can fix it.
With regard to the users a Mac, FLVPlayer.dmg file disguised pod FLV Player, is actually fake anti-viruses Macpurifier, informing the user about the presence of malicious software on the system and causes “mac users” to download and install additional applications.
Cylance Experts tell Google about what is happening October 25, 2016, and AdWord campaign was already locked. However, all users MacOS, who recently sought the Chrome, it is recommended to scan the system for malware.
AdWords malvertising targets MacOS users

According to experts, the fraudsters have acquired in AdWords advertising top places on request «Google Chrome», and the announcement is supposed to www.google.com/chrome. In fact, advertising sends users at googlechromelive.com, where the fake download page is located.
“Then a malicious download link leads the user to the macOS ttb.mysofteir.com sites, servextrx.com and www.bundlesconceptssend.com, which eventually is loaded virus file FLVPlayer.dmg», – experts say.
Whenever your hash malware changes that complicate its detection and tracking. Experts point out that Windows-based PCs users are theoretically at risk, as in their case, there is a redirect to admin.myfilessoft.com. Currently, the site displays an error due to a DNS failure, however, attackers can fix it.
With regard to the users a Mac, FLVPlayer.dmg file disguised pod FLV Player, is actually fake anti-viruses Macpurifier, informing the user about the presence of malicious software on the system and causes “mac users” to download and install additional applications.
Cylance Experts tell Google about what is happening October 25, 2016, and AdWord campaign was already locked. However, all users MacOS, who recently sought the Chrome, it is recommended to scan the system for malware.
Views: 437
©ictnews.az. All rights reserved.Similar news
- Cellphone Use May Raise Cancer Risk
- Australian police pushes cyber safety education
- Vietnam aims to lead in e-government
- Senate Website Gets Hacked
- US builds net for cyber war games
- Japan enacts anti-computer virus law
- India passes law vs e-waste
- Anonymous Declares War On The City Of Orlando
- Microsoft highlights evolving dangers as online identity data proliferates
- Consumers want internet security to be provided by banks
- Government facilities targets of cyber attack
- South Korean web attacks might been war drill
- Sri Lanka to Establish National Passport Database to Increase Border Security
- Hi-tech crime agencies set to employ information security professionals
- Phone hacking and online campaign bring down the News of the World