Home / TECHNOLOGY / Equifax rival TransUnion also sends site visitors to antagonistic pages

Equifax rival TransUnion also sends site visitors to antagonistic pages

Equifax isn’t the only credit-reporting behemoth with a website redirecting visitors to feign Adobe Flash updates. A confidence researcher from AV provider Malwarebytes pronounced transunioncentroamerica.com, a TransUnion site apportionment people in Central America, is also promulgation visitors to the feign updates and other forms of antagonistic pages.

As Ars reported late Wednesday night, a apportionment of Equifax’s website was redirecting visitors to a page that was delivering feign Adobe Flash updates. When clicked, the files putrescent visitors’ computers with adware that was rescued by only 3 of 65 antivirus providers. On Thursday afternoon, Equifax officials pronounced the fumble was the outcome of a third-party service Equifax was using to collect website-performance information and that the “vendor’s code using on an Equifax website was apportionment antagonistic content.” Equifax primarily close down the influenced apportionment of its site, but the company has given easy it after stealing the antagonistic content.

Now, Malwarebytes confidence researcher Jérôme Segura says he was means to regularly imitate a identical method of feign redirects when he forked his browser to the transunioncentroamerica.com site. On some occasions, the final couple in the method would pull a feign Flash update. In other cases, it delivered an feat pack that tried to taint computers with unpatched browsers or browser plugins. The attack method remained active at the time this post was going live. Segura published this blog post shortly after this essay went live on Ars.

“This is not something users wish to have,” Segura told Ars.


The common thread restraining the influenced Equifax and TransUnion pages is that both hosted fireclick.js, a JavaScript file that appears to plead the service apportionment the antagonistic content. When called, fireclick.js pulls calm from a prolonged method of pages, starting with those hosted by akamai.com, sitestats.com, and ostats.net. Depending on the visitors’ IP address, browsers eventually breeze up visiting pages that broach a feign survey, a feign Flash update, or an feat kit.

Segura believes ostats.net is the couple in the method where things spin bad, but he has nonetheless to endorse that. The full method in one transunioncentroamerica.com route looked like this:

The following GIF picture captures the redirection method in action:

Ostats.net also played a role in the redirects that took place on the influenced Equifax Web page. A video taken by eccentric confidence researcher Randy Abrams showed it promulgation him to a series of antagonistic sites that eventually lead to the adware lure.

Attempts to strech people who own the domain weren’t immediately successful. Ars e-mailed a orator at TransUnion to forewarn him of Segura’s finding. Until TransUnion has time to respond, people should sojourn heedful of the company’s several Web properties, quite the one apportionment Central America.

Equifax on Thursday was discerning to contend that its systems were never compromised in the attacks. Don’t be astounded if TransUnion says much the same thing. This is an critical eminence in some respects since it means that the redirections weren’t the outcome of enemy having entrance to limited tools of possibly company’s networks. At the same time, the incidents show that visitors to both sites sojourn much some-more exposed to antagonistic calm than they should be. What’s more, putrescent visitors aren’t likely to take much comfort in that clarification, either.

auto magazine

Check Also

Wind with batteries? Build it fast and it could cost $21/MWh in Colorado

reader comments 169 Proposals for renewable electricity era in Colorado are coming in cheap, like, …

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>