Popular music streaming site Spotify has been spotted serving the same fake antivirus software campaign that compromised large numbers of UK servers in February, security companies have reported. Popular music streaming site Spotify has been spotted serving the same fake antivirus software campaign that compromised large numbers of UK servers in February, security companies have reported.According to Websense, from 11.30am GMT on 24 March, an unknown number of users of the ‘Free’ version of Spotify’s Windows desktop app were served one of a range of possible remote software exploits through a rogue advert running inside the application itself.On unpatched systems where this behaviour was not detected by antivirus software, a bogus security application called ‘Windows Recovery’ would then have run. As with all apps of this kind Windows Recovery eventually pretends it has found a number of errors on targeted Windows PCs that must be fixed by taking out a license. This license is as useless as the software itself.Disturbingly, the ad does not require any user interaction to test the exploits against the system, and runs itself simply because the Spotify application has been loaded. The only Spotify users definitely not affected are paid subscribers whose clients do not display in-app advertising or those users who did not encounter it as the ads cycled. Mobile clients would not be affected. Spotify later turned off ads while it searched for the root of the problem, which have yet to be turned back on for all users as of 28 March.According to Avast, 59 percent of those encountering the ad were in Sweden, 40 percent in the UK, and 1 percent in other countries. The malware engine serving the exploits is believed to be based on based on the Russian Blackhole Exploit Kit, a recent and little-known program that is proving suddenly very popular with rogue antivirus pushing criminals.Last week, security company AVG said it had detected a large campaign built using this kit and directed against UK Internet users specifically. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe