Users of the popular adult website, pornhub.com may have been infected by a malware after hackers infiltrated the XXX entertainment channel. Millions of users could be at a risk from the advertising campaign by Kovter Group. Researchers at Proofpoint have alleged that hackers are using slight variations of a fake browser update scheme that worked on all three major Windows web browsers. Users have unknowingly installed the Kovter malware in US, UK, Canada, and Australia. Bride-to-be has steamy sex with stripper at her bachelorette party, gets dumped by fiancé after raunchy video goes viral!

The advertising network on Pornhub was abused by hackers and the users are being redirected to malicious websites. According to the Proofpoint report, both PornHub and Traffic Junky acted swiftly to remediate this threat upon notification. The fake ads that are being placed on Pornhub.com have geographical and ISP filtering and once the user passes these filters, the page shows a heavily obfuscated JavaScript. A recent large-scale attack by the malicious malware showed several potential victims in the targeted country. What is Ransomware WannaCry malware, Bitcoins? How to protect your Windows laptops and PCs?

According to the cybersecurity firm, the malvertising act (malicious advertising) delivered fake Google Chrome updates with runme.js file and tried to run the advertising fraud. These fake ads force users to apply a ‘critical update’ that helps them loot the advertisers. independent ad fraud expert Dr Augustine Fou said that the cases of Advertising frauds have been on the rise in the interwebs. “some advertisers only receive $0.01 for every $1 of impressions they pay,” he was quoted saying. Malvertising seems to be the latest addition to the long list of online threats and shows that the real looking extensions, as well as updates, may actually lead to the devices being infiltrated by hackers.