Microsoft Windows users should be aware of ongoing Skype malvertising campaign, which pushes bogus Flash Player updates to users. It shortly became apparent that culprits working behind this malvertising campaign are highly skilled cyber criminals that continuously create domains to host malware on and delete the old ones rapidly. It turns out that due to a malvertising campaign Skype users are receiving suggestions to install Flash Player update every time they logged into their accounts. These malicious ads immediately trigger a “File Download – Security Warning” window, which asks the user whether one wants to run or save the file called FlashPlayer.hta. The only suspicious thing about this pop-up is the source where the “required update” is going to be downloaded from.
The quick register-deregister process reportedly helps criminals to sidestep the need to pay for the domain and also contributes to keeping malware analysts away from malware samples. Representatives of Microsoft commented on the issue by saying that the described ads appeared due to “social engineering” efforts, and said that the company is not responsible for these malicious ads. According to the spokesperson of Microsoft, these bogus warnings were just rogue ads displayed to users and that the most efficient way to run a system check with anti-spyware or anti-malware software. We would like to add that you should definitely familiarize with the latest tricks used by cyber criminals to know what to expect and how to prevent malicious attacks against your PC. For instance, you can learn more about Skype viruses by reading this article. You might also be interested in ways how criminals employ fake software updates for ransomware distribution.