IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Barclays Fantasy Football site targeted by malvertising

The site's 16 million monthly users may have inadvertently dowloaded the Nuclear exploit kit

binary on a screen with words 'hacking attack'

The official Barclays Premier League Fantasy Football website has been targeted by criminals hoping to trick its users into downloading the Nuclear exploit kit.

The flash-based advert for a British yacht company, calling itself OKzilla, was being displayed to the website's 16 million users, automatically redirecting them to the malware download page.

The server IP was hidden behind CloudFlare making it difficult to find out the true owner of the website, although Who Is revealed it was registered using GoDaddy. A script then forwarded the user to Kanenia.info, another address hiding behind CloudFlare, which hosted a Google shortened URL where the Nuclear exploit kit was hidden.

The Nuclear exploit kit actually takes advantage of the Flash player installed on a user's machine, compromising the information stored on it. This particular type of malware is commonly responsible for launching zero-day attacks, which can in turn be used to infiltrate data from a user's machine.

MalwareBytes, which discovered the flaw, said it would have been difficult for unsuspecting users to realise they were being taken to a malicious site because it used the secure https protocol, encrypting the content of the page. Additionally, it used a shortened Google url, making it appear more trustworthy than it was.

"The malvertising chain is familiar as it makes use of goo.gl URLs (Google URL shortener) which are injected dynamically within compromised or blackhat sites," Jerome Segura said on the company's blog. "Those shortened URLs are used and discarded frequently and yet, because they belong to Google, a trusted company, cannot be blacklisted entirely at the root domain level."

MalwareBytes said it alerted the Premier League fantasy website to the malvertising and told Google that its shortened URLs were being used for malicious activities.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

RATDispenser evades nine in ten anti-virus engines
Security

RATDispenser evades nine in ten anti-virus engines

24 Nov 2021
Hackers use Linux backdoor on compromised e-commerce sites with software skimmer
malware

Hackers use Linux backdoor on compromised e-commerce sites with software skimmer

19 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

18 Nov 2021
Millions of routers and NAS devices vulnerable to BotenaGo malware
malware

Millions of routers and NAS devices vulnerable to BotenaGo malware

12 Nov 2021

Most Popular

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Open source giant Red Hat joins HPE GreenLake ecosystem
automation

Open source giant Red Hat joins HPE GreenLake ecosystem

28 Jun 2022
Carnival hit with $5 million fine over cyber security violations
cyber security

Carnival hit with $5 million fine over cyber security violations

27 Jun 2022