![traffic junky traffic junky](http://finchsells.com/wp-content/uploads/2014/03/optimisation-process.png)
Proofpoint has said that as soon as PornHub as well as Traffic Junky were notified of the discovery they both acted quickly to try and deal with the threat. Hackers are continuously finding new and crafty ways to infect people's systems and it often takes time for the victims to realize what they are getting away with, in this instance, the campaign had been in place for over a year before being discovered.
#TRAFFIC JUNKY UPDATE#
The ads would tell users they needed to apply a critical update so that the users, thinking it was an actual message from their browser, would run the malware and infect themselves.Īd networks offer sophisticated filtering to vendors, and hackers are increasingly using these, combined with intelligent social engineering, to hijack the advertising inventories that give them access to very popular websites where they can then target people operating specific software with certain vulnerabilities. Specifically, they exploited the ad systems offered by Traffic Junky. The hacker group responsible for the attack is known as KovCoreG, and they managed to develop malvertising that delivered fake browser updates for the widely used Internet browsers: Chrome, Microsoft Edge/Internet Explorer, and Firefox.
![traffic junky traffic junky](http://imobitrax.com/new/wp-content/uploads/2013/05/Screen-Shot-2013-05-22-at-8.50.58-PM.png)
As well as having several years’ experience in media buying, TrafficJunky is owned by the MindGeek media empire, which itself in ownership of several online platforms that all enjoy masses of traffic every day. Cyber security firm Proofpoint has released a report outlining how millions of people in the UK, US, Canada, and Australia may have been infected by malware that hackers managed to insert into the adverts on adult website PornHub. TrafficJunky was first conceived back in 2008, and the Canadian company has been making waves in the advertising sector ever since.