To remediate a malware infection associated with 3ve, DHS and FBI recommend the following: use and maintain antivirus software, avoid clicking links in emails, change your passwords, keep your OS and app software up-to-date, and use anti-malware tools.
The alert gives indicators of compromise (IOCs) as well as examples of anti-malware tools, those being: ESET Online Scanner, F-Secure, Malwarebytes, Microsoft Safety Scanner, and others.
From Google Security Blog:
In partnership with White Ops, we have published a white paper about how we identified this ad fraud operation, the steps we took to protect our clients from being impacted, and the technical work we did to detect patterns across systems in the industry. Below are some of the highlights from the white paper, which you can download here.
TA18-331A: 3ve – Major Online Ad Fraud Operation https://t.co/csj8qzgWQp #NCCIC #cyber #cybersecurity #infosec
— US-CERT (@USCERT_gov) November 27, 2018
No comments:
Post a Comment