• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Spotify Falls Victim to Malvertising Attack

October 10, 2016 by Ahmed A. Alkaysi 3 Comments

This article talks about how users of Spotify’s free service have noticed that many advertisements automatically open their web browser, without them clicking on the advertisement. These websites contain virus and malware, and can contaminate the device without the user taking any action in it. Not only are the users directed to malicious sites, but malware can automatically be downloaded from these sites in attacks known as “drive-by-attacks”. These “malvertising” campaigns are the results of scripts being hidden in advertisements, which does everything automatically. What worries me, a lot of times advertisements are not thoroughly screened before being accepted. It wouldn’t surprise me if we start seeing more of these types of attacks.

Link: http://www.securityweek.com/spotify-falls-victim-malvertising-attack

Filed Under: Week 07: NetCat and HellCat Tagged With:

Reader Interactions

Comments

  1. Loi Van Tran says

    October 10, 2016 at 11:16 am

    This is an extremely interesting article. If think outside the bounds of just Spotify, a lot of freemium apps provide ads in exchange for their service, e.g., Facebook, games, etc. If these companies do not properly screen the ads that they add into their network they are making hundreds, thousands, or even billions of people vulnerable to malicious attacks on their devices without the consumers knowledge. So how could we as consumers protect ourselves if we entrust these companies to screen for these types of attacks?

    Log in to Reply
  2. Jason A Lindsley says

    October 11, 2016 at 10:04 pm

    I agree with Loi Van – these companies should be required to do more due diligence and vulnerability testing for their advertisers to protect their customers.

    In the meantime, I’ll be happy to pay my Spotify bill this month knowing that I’m not vulnerable to this threat. Can’t really complain with the $5 per month student rate for this service!

    Log in to Reply
  3. Mauchel Barthelemy says

    October 15, 2016 at 2:03 pm

    To answer your question Loi Van, I believe one of the best ways to force companies to go the extra mile to ensure full protection is for us (consumers) to start taking cyber security more seriously as we should. We have to make them feel cyber security is an important factor in the services big organizations offer. Hopefully Spotify addresses this quickly before it gets worse. Has Spotify commented on what happened and how they’re addressing this? I’m assuming they did, but couldn’t find anything so far.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in