View Single Post
Ensign
Join Date: Jul 2012
Posts: 4
# 37
11-01-2012, 08:37 PM
Quote:
Originally Posted by jbmaverick View Post
"Earlier today Curse was notified by Google that there was a script known to be malicious being served though some of our sites. Upon further inspection Curse has determined the script was being served through ad placements from a 3rd party. These ads were being served as they normally would; however, due to a security breach at the 3rd party, a malicious JS was being served that was put in their passback system.
We have managed to identify the 3rd party, who is well known to be trusted, as the source of the script. They have been contacted about the compromise and have removed the malicious script being served to not only Curse, but possibly everyone with whom they work. They are still investigating the breech.
Curse takes security extremely seriously and has removed all 3rd party ad partners until the investigation is complete. We will keep you informed of the outcome of this investigation. In the meantime, we recommend you run a malware scan on your computer. You can run a free scan at http://www.malwarebytes.org/. We sincerely apologize for this inconvenience."

Posted on the Minecraft Wiki, but they also work with Curse so likely the same issue.
We host both wikis, and the message here applies to all of our affected sites.

The other important thing to note is that any site using this ad provider may have been affected, so, if you were surfing the web this morning or last night, strongly consider running a virus scan to be on the safe side.

As for the warnings, it looks like some people are still receiving them and some aren't. It could easily take up to 24 hours before those stop showing up.

- Eyes, STOWiki Admin, Curse Wiki Manager