Google App Engine sites flog adware

By

Pushed via fake Java update.

Two legitimate-looking websites on the Google App Engine server are serving up adware to unsuspecting users.

Google App Engine sites flog adware

The Google App Engine is a platform for developing and hosting web applications that also allows customers to register and host websites using the domain appspot.com. 

The first appspot.com website prompted a free Java download for the executable file “Setup.exe” and appears very similar to the download page for Java.

When executed, users were told that they did not have the minimum system requirements as a means to hide malware installation, Barracuda Labs researcher Jason Ding said.

The second appspot.com website prompted the message, “A Media Player Update is Required to View this Content,” and users were once again prompted to download “Setup.exe,” which installed the adware.

Barracuda Labsdubbed the malware as "Solimba Adware."

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Microsoft knew of SharePoint security flaw in May, initial patch ineffective

Microsoft knew of SharePoint security flaw in May, initial patch ineffective

Allianz Life says majority of US customers' data stolen in hack

Allianz Life says majority of US customers' data stolen in hack

NT gov agency targeted in alleged $3.5m BEC scam

NT gov agency targeted in alleged $3.5m BEC scam

Gov to encourage vuln research, puts insurers and NFPs on notice

Gov to encourage vuln research, puts insurers and NFPs on notice

Log In

  |  Forgot your password?