Malvertising Via Skype Delivers Angler

A recent malvertising campaign shows that platforms that display ads, even when they are not necessarily the browser, are not immune to the attack.

An example of a popular non-browser application that shows ads is Skype. These images would be familiar to avid Skype users.

Skype Ad

Skype Call Ad

Skype Ads

This did not really bother us much until last night, when we saw an unusual spike from our charts due to a malvertising campaign via the AppNexus ad platform (



One of the platforms for infection that we observed was Skype. It was interesting to note that having the ad displayed in a platform external to the browser did not mean that the browser was no longer accessible and thus the user could no longer be affected.[...]uAQA&s=1d86c6[...]&
    led to[...]uAQA&s=a9adea[...]&
    led to

This is not the first time infections were launched via Skype though, previous reports already mentioned the Skype scenario in forums and security news.

This particular campaign ended up redirecting to the Angler exploit kit.

Typical browser visits were there, of course, which means that this attack was not targeted towards Skype users.  For a user that used a browser, here’s an example of the infection chain that we have observed:

  • User visited
  • pulled an ad from
  • pulled an ad from
  • redirects to which is the Angler exploit kit landing page
  • Angler exploit kit downloads and installs a ransomware called TeslaCrypt

A machine infected with TeslaCrypt will display this message:


Other popular websites that redirected to were gaming-related sites (,,,, news sites ( as well as internet portals like

This campaign seemed to have ended quite fast. The good thing is, during the active campaign, our users are protected against this threat as we detect Angler as Exploit:JS/AnglerEK.D.

Articles with similar Tags