Regardless of how up to date our computers are, How good our Antivirus protection is, we all are at risk from malicious adverts on webpages. Now I accept adverts are part of the web today. I personally don’t use or recommend ad blockers because many websites ( including this one) rely on enough income from the adverts to pay hosting costs. There will always be an element of maliciousness by some unscrupulous advertisers or where the advert chain has been compromised by bad actors. Luckily my settings & antivirus has protected me.
I was reading a page on my local newspaper site a few minutes ago when I got a divert and a big red warning from my Antivirus ESET
It must have been one of the adverts on the page, but I cannot find out which one, because they change each visit
Anyway the page I was diverted to ( a fake flash player update page) is https://izaiye-interactive.net/6141452444727/01296f4851adb85de3a1ad2335c429c8/52ebc0f94a7674f6db533556c202e52f.html (currently giving a 404, so obviously needs the referral from the malicious advert or the webpage to display and stays under the radar otherwise) They are using a ssl prefix HTTPS but there is no padlock in the url to confirm this.
Joebox shows a lot more details but still no actual payload. It looks like it should download a MP4 and a flv file that would be converted by the script to a working malware binary. Joebox also shows invalid character messages on running the files. ( this might be an anti- sandbox / anti analysis measure by the bad actors or it might genuinely be bad coding by the bad actors distributing this malware.
I experienced a similar attack recently documented https://myonlinesecurity.co.uk/fake-flashplayer-update-via-exploit-using-adverts-on-legit-site/
izaiye-interactive.net was registered yesterday on 30 May 2017 using what are obviously fake registrants details via PUBLICDOMAINREGISTRY.COM and hosted on 126.96.36.199 reliablesite.net