MSN Home Page Drops More Malware Via Malvertising

MSN Home Page Drops More Malware Via Malvertising

Malvertisers are once again abusing ad technology platform AdSpirit and exposing visitors of the MSN homepage to malware. These attacks appeared to have been primarily focused on Germans users via an ad for Lidl, one of the Germany’s leading supermarkets.

This is not the first time we have caught malvertising on MSN or via AdSpirit. Each time, we spot telltale signs of suspicious activity with advertiser domains freshly created a few days prior the attack or hiding behind the CloudFlare service.

Perhaps the only surprise here was to find different exploit kits than the usual Angler EK to carry out the execution to the malware payload. In two separate incidents, we observed the RIG and Neutrino exploit kits.


Incident #1 Flow:

  • Ad call:
  • Rogue advertiser:{redacted}
  • Rogue advertiser:{redacted}
  • RIG EK:{redacted}
Domain Name: Creation Date: 2016-01-12 Registrant Email:
Domain Name: Creation Date: 2016-01-06 Registrant Name: Jhon Smith [sic]
Incident #2 Flow


  • Ad call:{redacted}&
  • Ad platform:
  • Advertiser:{redacted}
  • Advertiser:{redacted}
  • Rogue advertiser:{redacted}
  • Rogue advertiser:{redacted}
  • Neutrino EK:
Domain Name: Creation Date: 2016-01-17 Registrant Email:
Domain Name: Creation Date: 2016-01-12 Registrant Email: Jhon Smith [sic]

While we did not collect the payload in these specific attacks, other similar captures of RIG during the same time frame show that CryptoWall ransomware was downloaded onto vulnerable machines.


We immediately notified AdSpirit about those incidents which were confirmed and addressed promptly. AppNexus also deactivated the offending ad objects and will be doing a further review about these attacks.

To prevent these malvertising infections please ensure that your computer is up to date and that you are running the right security tools to mitigate those attacks. We recommend a combination of Anti-Exploit and Anti-Malware to keep the bad guys at bay.


Jérôme Segura

Principal Threat Researcher