Threat Database Viruses Mal/Iframe-Y

Mal/Iframe-Y

By Domesticus in Viruses

Threat Scorecard

Ranking: 14,313
Threat Level: 80 % (High)
Infected Computers: 56
First Seen: December 20, 2011
Last Seen: September 14, 2023
OS(es) Affected: Windows

Mal/Iframe-Y is a label that security specialists have applied to a malware attack that has been linked to a popular story at the United Kingdom main America Online (AOL) website. This popular news story talks about the possibility of Kate Middleton, the newest addition to the British royal family, being pregnant, although it actually talks about a doll made to resemble a pregnant Kate Middleton. Knowing that stories about the British royal family will always be immensely popular among British readers, criminals have taken advantage of it in order to use this website to attack their victims. According to ESG security researchers, this is a popular practice among computer criminals which, taking advantage of a particular page's popularity and relative lack of security, can insert their own malicious code in order to turn it into an attack website of sorts.
 
The pregnant Kate Middleton doll story was actually published on the MyDaily.co.uk website which also belongs to the vast AOL group of websites. Since this story has been linked through the main AOL UK web page, it has attracted a large number of visitors that would normally not visit this AOL subsidiary.

 
Like many websites, the website running this story uses a JavaScript functionality that allows it to rotate its advertisements so that it will not always display the same advertisements. However, hackers have taken advantage of vulnerabilities in this advertisement carrousel in order to insert their own malicious code to be displayed along with regular advertisements. This inserted code attempts to run a malicious script located at a remote website whenever a victim enters the website containing the Kate Middleton story. Security specialists have classified this third party website as Mal/Iframe-Y and consider a threat to a computer system's security. Computer criminals will often take advantage of security loopholes to infect computer users with malware or steal personal information. While one part of distributing malware is creating the malware itself, it is equally important for criminals to find ways to distribute this malware. Taking advantage of popular online stories and websites saves criminals the trouble of having to create their own content in order to attract victims.

Trending

Most Viewed

Loading...