Ad Serving Firm Delivers Virus

Falk AG became an agent of the Bofra virus on Saturday, delivering the exploit to users whose browsers requested ads from its customers' sites.

Ad management firm Falk AG briefly became an agent of the Bofra virus on Saturday, delivering the Internet Explorer exploit to users whose browsers requested ads from its customers’ sites. The incident occurred between 12:10 a.m. and 6:30 a.m. Eastern Standard Time.

“On Saturday a virus was found on the Falk network which was inadvertently redistributed to a small number of users,” the company said in a statement.

Falk estimated two percent of its users received the virus, which it removed shortly after detection. Bofra originated on the company’s European network, but the statement did not address whether it had spread to publisher clients in other regions.

Falk’s publisher clients include Sony Pictures Digital, NBC Universal, Interep Interactive, AtomShockwave, The Golf Channel and The Register.

The Register, a tech-focused Web site, issued an alert to its readers on Sunday following the incident. The publisher urged users who visited in that window to update their virus software, and said it had suspended its patronage of Falk pending a deeper explanation of the incident. As of Monday morning, the publisher did not appear to be serving ads.

The Register also published a statement it received from Falk that differed from the one the ad serving company issued to the media. In it, Falk said the virus entered its network through a hacker attack on one of its load balancers. A load balancer is software that handles even distribution of ads to all servers.

“The use of a weak point in one of our load balancers led to user requests not being passed to the ad servers,” that statement said. “Instead the user requests were answered with a 302 redirect to a compromised website. This happened with approximately every 30th request. Users visiting websites that carry banner advertising delivered by our system were periodically delivered a file from the compromised site. This file tries to execute the IE-Exploit function on the users’ computer.”

Falk promised another statement would be released today, more fully explaining the incident.

Interactive marketing blog MarketingVOX first spotted The Register‘s statement and reported the incident.

Subscribe to get your daily business insights

Engagement To Empowerment - Winning in Today's Experience Economy
Report | Digital Transformation

Engagement To Empowerment - Winning in Today's Experience Economy

2y

Engagement To Empowerment - Winning in Today's Exp...

Customers decide fast, influenced by only 2.5 touchpoints – globally! Make sure your brand shines in those critical moments. Read More...

View resource
Announcement Alert from Lee Arthur
Weekly briefing | Digital Transformation

Announcement Alert from Lee Arthur

2y

Announcement Alert from Lee Arthur

Announcement Alert!! Read More

View resource
The 2023 B2B Superpowers Index
Whitepaper | Digital Transformation

The 2023 B2B Superpowers Index

3y

The 2023 B2B Superpowers Index

The Merkle B2B 2023 Superpowers Index outlines what drives competitive advantage within the business culture and subcultures that are critical to succ...

View resource
Impact of SEO and Content Marketing
Whitepaper | Digital Transformation

Impact of SEO and Content Marketing

3y

Impact of SEO and Content Marketing

Making forecasts and predictions in such a rapidly changing marketing ecosystem is a challenge. Yet, as concerns grow around a looming recession and b...

View resource