Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/7/2016
02:34 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Malicious Ad Served Gratis With Spotify Free

Small number of users may have been impacted by malvertising, digital music service admits

For the past several days, Spotify appears to have streamed more than just music to users of its free music service option.

Several users posting on the digital music service’s community forum this week complained about getting hit with malware that caused the default browsers on their systems to automatically open to sites running malicious software. The problem appeared to affect browsers running on Windows and Mac systems.

A Spotify Community forum member first complained about the problem on Tuesday. “If you have Spotify Free open, it will launch - and keep on launching - the default Internet browser on the computer to different kinds of malware / virus sites. Some of them do not even require user action to be able to cause harm,” the user had noted.

After testing the issue on three different computers, the user said the problem most likely had to do with a malicious advertisement, or malvertisement, being served up in Spotify Free.

In an unsigned and unattributed response to the comment, Spotify said it had identified a “small number of users “experiencing problems with questionable website popups via their default browsers. Spotify attributed the problem to an “isolated issue” with an advertisement in its Free tier and claimed it had shut the ad down.

However, a scan of the comments on Spotify Community Friday afternoon showed that some users are continuing to experience problems seemingly related to the issue late this week.

“I am aware of your recent status that the malware ads on Spotify Free has been fixed,” one commenter using the handle sriku91 said Thursday. “However, I still face the problem of such annoying ads opening in any browser I have. This is seriously worrying me not only because of Spotify but the fact that my whole computer is at risk.” The user later reported the problem appeared to have been fixed.

Over the last one day a handful of other users reported failed login attempts to their Google accounts, malware and LAN settings getting automatically changed as the result of a malicious ad being served via Spotify Free.

Malvertisements are online ads with malicious code embedded in them that are often distributed via legitimate online ad platforms and services. Threat actors have increasingly begun using malvertisements because they offer an easier way than other methods for installing malware like data-stealing Trojans, ransomware, and spyware on user systems. In many cases, users only have to visit a website hosting a malicious ad to get infected.

“Apps that appear to be free, which are ad-supported, bring extra risk in the form of malvertising,” says Lysa Myers, security researcher at ESET. “People need to be aware of this extra risk, if they choose to install apps that display ads,” she said.

Users can limit their exposure to malicious ads by being more diligent about the applications they download on their systems. For instance, they can verify if an application or service has been previously associated with malicious ads. “But keep in mind that sometimes these things slip into otherwise high-quality ad networks, so it’s a good idea to keep your software—especially OS, browsers and plug-ins—regularly updated, she says.

It is also important for users to stop assuming the only users on Windows platforms are susceptible to such issues.  “Linux and OS X are not immune, and need to be protected with security software too,” Myers said.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7747
PUBLISHED: 2020-10-20
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
CVE-2020-7748
PUBLISHED: 2020-10-20
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
CVE-2020-7749
PUBLISHED: 2020-10-20
This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page wh...
CVE-2020-5640
PUBLISHED: 2020-10-20
Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors.
CVE-2020-15256
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...