Clicking a banner advertisement could be dangerous to your PC's health, if the click takes you to a Web site that attempts to download malicious code.
This happened last week, when some European Web sites were victims of an attack that turned their banner advertising into hyperlinks to sites run by cyber criminals. The attack affected sites in the UK, Sweden and the Netherlands, including The Register computer news site. All were customers of Falk AG, a German ad serving company.
This particular attack is known as the Bofra/IFrame exploit, and it takes advantage of a weakness in Microsoft's Internet Explorer 6.0 browser. The result was that for around six hours -- until the problem was detected -- users of the affected sites were in danger of being redirected to sites that tried to install malicious software such as "porn dialers" and spyware on their PCs.
The exploit does not affect users running alternative browsers, such as Firefox, or Windows XP users who have installed Service Pack 2 (SP2).
Falk AG issued a statement saying: "The cause was a hacker attack on one of our load balancers. This attack made use of a weak point on this specific type of load balancer."
The function of a load balancer is to evenly distribute requests to the multiple servers behind it. This particular system was only used to handle a specific request type to its ad server. Once it became aware of the problem, Falk AG shut down the affected load balancer and removed it. It also carried out checks to ensure all other load balancers were secure.
One of the UK sites affected, The Register, informed readers of the problem and suspended ad serving from Falk for three days. Drew Cullen, the editor of The Register, said: "This is a cause for concern because we remain unsure whether the cause of the problem has been clearly identified. We are also concerned that many sites affected have just kept quiet. When something like this happens, it is imperative that sites make a full disclosure."
Asserta.com, another of Falk's UK customers, would not comment. It remains unclear how many sites were affected, but The Register estimates it could be as high as 30.
On its site, The Register said it had 11,660 unique visitors using Windows and IE6 during the period it was being served malicious ads. But the impact was likely to be limited, because Falk estimates that only one in 30 requests for a banner ad would have been redirected to the site containing the Bofra worm.
Danny Meadows-Klue, the chief executive of the Interactive Advertising Bureau, said the problem was being closely monitored.
"Every community has its vandals and we have to warn users to ensure they are protected with anti-virus software and firewalls.
"Unfortunately, this industry does suffer periodically from this kind of thing," he said.
He agreed that such attacks could increase, but did not think it was likely.
However, analyst firm Gartner is predicting that Bofra/IFrame attacks will increase, especially around systems with what it calls sloppy patching. In an e-mail, it said: "Attacks of this type will become increasingly common, especially around transition points -- systems where multiple versions of software (such as Windows 2000 and XP) are in use without full patches across both platforms."
Meanwhile, Microsoft issued a statement saying it was investigating the attack and confirmed that the vulnerability only existed for IE6. It is encouraging customers to upgrade to SP2.
Whatever the result, there is no doubt that many sites running online ads will be taking security more seriously in the wake of the latest attack. If users become wary of clicking banner ads, this could have a devastating effect on their income.
RETHINK? The defense ministry and Navy Command Headquarters could take over the indigenous submarine project and change its production timeline, a source said Admiral Huang Shu-kuang’s (黃曙光) resignation as head of the Indigenous Submarine Program and as a member of the National Security Council could affect the production of submarines, a source said yesterday. Huang in a statement last night said he had decided to resign due to national security concerns while expressing the hope that it would put a stop to political wrangling that only undermines the advancement of the nation’s defense capabilities. Taiwan People’s Party Legislator Vivian Huang (黃珊珊) yesterday said that the admiral, her older brother, felt it was time for him to step down and that he had completed what he
Taiwan has experienced its most significant improvement in the QS World University Rankings by Subject, data provided on Sunday by international higher education analyst Quacquarelli Symonds (QS) showed. Compared with last year’s edition of the rankings, which measure academic excellence and influence, Taiwanese universities made great improvements in the H Index metric, which evaluates research productivity and its impact, with a notable 30 percent increase overall, QS said. Taiwanese universities also made notable progress in the Citations per Paper metric, which measures the impact of research, achieving a 13 percent increase. Taiwanese universities gained 10 percent in Academic Reputation, but declined 18 percent
UNDER DISCUSSION: The combatant command would integrate fast attack boat and anti-ship missile groups to defend waters closest to the coastline, a source said The military could establish a new combatant command as early as 2026, which would be tasked with defending Taiwan’s territorial waters 24 nautical miles (44.4km) from the nation’s coastline, a source familiar with the matter said yesterday. The new command, which would fall under the Naval Command Headquarters, would be led by a vice admiral and integrate existing fast attack boat and anti-ship missile groups, along with the Naval Maritime Surveillance and Reconnaissance Command, said the source, who asked to remain anonymous. It could be launched by 2026, but details are being discussed and no final timetable has been announced, the source
SHOT IN THE ARM: The new system can be integrated with Avenger and Stinger missiles to bolster regional air defense capabilities, a defense ministry report said Domestically developed Land Sword II (陸射劍二) missiles were successfully launched and hit target drones during a live-fire exercise at the Jiupeng Military Base in Pingtung County yesterday. The missiles, developed by the Chungshan Institute of Science and Technology (CSIST), were originally scheduled to launch on Tuesday last week, after the Tomb Sweeping Day holiday long weekend, but were postponed to yesterday due to weather conditions. Local residents and military enthusiasts gathered outside the base to watch the missile tests, with the first one launching at 9:10am. The Land Sword II system, which is derived from the Sky Sword II (天劍二) series, was turned