Ad Serving Firm Delivers Virus

Falk AG became an agent of the Bofra virus on Saturday, delivering the exploit to users whose browsers requested ads from its customers' sites.

Ad management firm Falk AG briefly became an agent of the Bofra virus on Saturday, delivering the Internet Explorer exploit to users whose browsers requested ads from its customers’ sites. The incident occurred between 12:10 a.m. and 6:30 a.m. Eastern Standard Time.

“On Saturday a virus was found on the Falk network which was inadvertently redistributed to a small number of users,” the company said in a statement.

Falk estimated two percent of its users received the virus, which it removed shortly after detection. Bofra originated on the company’s European network, but the statement did not address whether it had spread to publisher clients in other regions.

Falk’s publisher clients include Sony Pictures Digital, NBC Universal, Interep Interactive, AtomShockwave, The Golf Channel and The Register.

The Register, a tech-focused Web site, issued an alert to its readers on Sunday following the incident. The publisher urged users who visited in that window to update their virus software, and said it had suspended its patronage of Falk pending a deeper explanation of the incident. As of Monday morning, the publisher did not appear to be serving ads.

The Register also published a statement it received from Falk that differed from the one the ad serving company issued to the media. In it, Falk said the virus entered its network through a hacker attack on one of its load balancers. A load balancer is software that handles even distribution of ads to all servers.

“The use of a weak point in one of our load balancers led to user requests not being passed to the ad servers,” that statement said. “Instead the user requests were answered with a 302 redirect to a compromised website. This happened with approximately every 30th request. Users visiting websites that carry banner advertising delivered by our system were periodically delivered a file from the compromised site. This file tries to execute the IE-Exploit function on the users’ computer.”

Falk promised another statement would be released today, more fully explaining the incident.

Interactive marketing blog MarketingVOX first spotted The Register‘s statement and reported the incident.

Subscribe to get your daily business insights

Whitepapers

US Mobile Streaming Behavior
Whitepaper | Mobile

US Mobile Streaming Behavior

5y

US Mobile Streaming Behavior

Streaming has become a staple of US media-viewing habits. Streaming video, however, still comes with a variety of pesky frustrations that viewers are ...

View resource
Winning the Data Game: Digital Analytics Tactics for Media Groups
Whitepaper | Analyzing Customer Data

Winning the Data Game: Digital Analytics Tactics for Media Groups

5y

Winning the Data Game: Digital Analytics Tactics f...

Data is the lifeblood of so many companies today. You need more of it, all of which at higher quality, and all the meanwhile being compliant with data...

View resource
Learning to win the talent war: how digital marketing can develop its people
Whitepaper | Digital Marketing

Learning to win the talent war: how digital marketing can develop its peopl...

2y

Learning to win the talent war: how digital market...

This report documents the findings of a Fireside chat held by ClickZ in the first quarter of 2022. It provides expert insight on how companies can ret...

View resource
Engagement To Empowerment - Winning in Today's Experience Economy
Report | Digital Transformation

Engagement To Empowerment - Winning in Today's Experience Economy

2m

Engagement To Empowerment - Winning in Today's Exp...

Customers decide fast, influenced by only 2.5 touchpoints – globally! Make sure your brand shines in those critical moments. Read More...

View resource