More than a month after Microsoft patched the .ANI vulnerability, the geek favorite e-tailer Tom’s Hardware has found the W32.ani Trojan lurking in one of its banner ads.
ScanSafe, a managed Web security services company, on May 8 noticed a spike in traffic blocks that had a common theme. The company found that Tomshardware.com was unknowingly hosting the banner ad, which was redirecting users to a site where the driveby malware was automatically downloaded. In an interview with ScanSafe, Vice President of Product Strategy Dan Nadir said that the ad was being hosted out of a site in Argentina.
The banner ad was up, infecting victims with unpatched systems, for 24 hours. When ScanSafe contacted Tom’s Hardware, they were told that the site had already learned of the Trojan from its victims. The site has since removed the ad.
continued @ eweek