MSN and NBC vulnerabilities leave 'ransomware' on unprotected PCs Many Internet users think that so long as you visit well-known websites you’ll be safe online. Yet ,recent research from AVG’s Web Threats Research Team has identified two cybercrime campaigns coded into some of the internet’s most popular sites.With increasingly sophisticated attacks, sticking to major websites when browsing online is not enough to keep you safe anymore. Cybercriminals aren’t lurking only in the internet’s dark alleyways waiting to steal your details, but are brazenly hacking sites you already trust in order to install so-called ‘ransomware’ on your PC or tablet. See also: Why the police virus was so effectiveAVG’s Insight Report reveals how researchers discovered a popular page on MSN Italy was redirecting visitors using malicious code that bore the traits of the ‘Cool Exploit Kit’ – one of the latest in a growing number of off-the-shelf malware solutions available to wannabe cybercriminals.The malware generated a full-screen message claiming to be from the US Department of Justice, which advised users their PC had been blocked due to illegal files saved on the systems network.It’s a similar tactic to the ‘police’ virus which has been robbing users of their cash recently. See also: What are the biggest mobile threats in 2013?Although prompted to pay a ‘release fee’ to regain control of the system, paying the ‘ransom’ did not unlock the machine or remove the malicious code. To regain control, the user (or an IT professional) had to clean boot the machine and attempt to repair it by tracking down and removing the malicious code. A similar attack which redirected users to ‘Redkit Exploit Kit’ code was tracked by the same researchers on sites including US TV Network NBC.com, Late Night With Jimmy Fallon and Jay Leno’s Garage. By using Javascript files and a Redkit Exploit Kit unwitting visitors were directed to hundreds of websites that had also been compromised by the cybercriminals.The Redkit – like many exploit kits – was configured to install malware on any exploited PC; in this case it installed the Citadel Trojan, which stole users banking credentials and other sensitive information stored on their PC. The bulk of the reports were from consumers in the US, Canada and the UK.What might seem some surprising is that these are clearly not amateur websites built and operated without thought of security or budget to keep the bad guys out – they’re major websites owned by large corporations, and most people would quite naturally assume they’d be safe visiting them without fear of their computer being harmed.Yuval Ben-Itzhak, AVG’S Chief Technology Officer said, “These cases prove that advice to stick to reputable websites to avoid cybercriminals is no longer fully valid. Of course, you’ll be safer than if you browse the Internet’s seedier destinations, but hacked sites are as common as ever and infected pages can be, as we see here, served from big-name sites that you would normally expect to be safe and secure.”To ensure you do not fall victim to the latest malware trend AVG suggests following the three simple steps below:1) Scan those links: This has to be the first line of defence against web-based malware. Many security products come with link scanner capabilities already installed. After all, if you can avoid the infected pages completely, your device stands a much better chance of staying protected. 2) Security software: Link scanning is one measure you should take, but it’s also important to have up to date antivirus security software installed. It can help prevent the malware from doing any damage by either blocking it in the first instance or, if it does manage to infect your system, removing all traces of the software.3) Moving target: Recent research shows that mobile malware is rising. Whether you are browsing using your tablet, smartphone or laptop stay sharp about online threats and take action to protect yourself online.You may also be interested in our security software reviews Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe