Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/7/2016
02:34 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Malicious Ad Served Gratis With Spotify Free

Small number of users may have been impacted by malvertising, digital music service admits

For the past several days, Spotify appears to have streamed more than just music to users of its free music service option.

Several users posting on the digital music service’s community forum this week complained about getting hit with malware that caused the default browsers on their systems to automatically open to sites running malicious software. The problem appeared to affect browsers running on Windows and Mac systems.

A Spotify Community forum member first complained about the problem on Tuesday. “If you have Spotify Free open, it will launch - and keep on launching - the default Internet browser on the computer to different kinds of malware / virus sites. Some of them do not even require user action to be able to cause harm,” the user had noted.

After testing the issue on three different computers, the user said the problem most likely had to do with a malicious advertisement, or malvertisement, being served up in Spotify Free.

In an unsigned and unattributed response to the comment, Spotify said it had identified a “small number of users “experiencing problems with questionable website popups via their default browsers. Spotify attributed the problem to an “isolated issue” with an advertisement in its Free tier and claimed it had shut the ad down.

However, a scan of the comments on Spotify Community Friday afternoon showed that some users are continuing to experience problems seemingly related to the issue late this week.

“I am aware of your recent status that the malware ads on Spotify Free has been fixed,” one commenter using the handle sriku91 said Thursday. “However, I still face the problem of such annoying ads opening in any browser I have. This is seriously worrying me not only because of Spotify but the fact that my whole computer is at risk.” The user later reported the problem appeared to have been fixed.

Over the last one day a handful of other users reported failed login attempts to their Google accounts, malware and LAN settings getting automatically changed as the result of a malicious ad being served via Spotify Free.

Malvertisements are online ads with malicious code embedded in them that are often distributed via legitimate online ad platforms and services. Threat actors have increasingly begun using malvertisements because they offer an easier way than other methods for installing malware like data-stealing Trojans, ransomware, and spyware on user systems. In many cases, users only have to visit a website hosting a malicious ad to get infected.

“Apps that appear to be free, which are ad-supported, bring extra risk in the form of malvertising,” says Lysa Myers, security researcher at ESET. “People need to be aware of this extra risk, if they choose to install apps that display ads,” she said.

Users can limit their exposure to malicious ads by being more diligent about the applications they download on their systems. For instance, they can verify if an application or service has been previously associated with malicious ads. “But keep in mind that sometimes these things slip into otherwise high-quality ad networks, so it’s a good idea to keep your software—especially OS, browsers and plug-ins—regularly updated, she says.

It is also important for users to stop assuming the only users on Windows platforms are susceptible to such issues.  “Linux and OS X are not immune, and need to be protected with security software too,” Myers said.

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
Where Businesses Waste Endpoint Security Budgets
Kelly Sheridan, Staff Editor, Dark Reading,  7/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-13643
PUBLISHED: 2019-07-18
Stored XSS in EspoCRM before 5.6.4 allows remote attackers to execute malicious JavaScript and inject arbitrary source code into the target pages. The attack begins by storing a new stream message containing an XSS payload. The stored payload can then be triggered by clicking a malicious link on the...
CVE-2019-13644
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.1 is vulnerable to stored XSS due to lack of filtration of user-supplied data in a budget name. The JavaScript code is contained in a transaction, and is executed on the tags/show/$tag_number$ tag summary page.
CVE-2019-13645
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file names. The JavaScript code is executed during attachments/edit/$file_id$ attachment editing.
CVE-2019-13646
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to reflected XSS due to lack of filtration of user-supplied data in a search query.
CVE-2019-13647
PUBLISHED: 2019-07-18
Firefly III before 4.7.17.3 is vulnerable to stored XSS due to lack of filtration of user-supplied data in image file content. The JavaScript code is executed during attachments/view/$file_id$ attachment viewing.