Quote:A sophisticated browser locker campaign that ran on high-profile pages, like Microsoft Edge's home or popular tech sites, was deactivated this week after in-depth research was published.
The actors behind it used a compromised an ad content supplier for top-tier distribution and combined targeted traffic filtering with steganography.
This mix allowed the operation to survive for at least two years, bringing victims to a tech support scam page and threat researchers to a dead end as they scratched their heads about how the redirect to the fake malware reporting page happened.
Read more: https://www.bleepingcomputer.com/news/se...s-a-break/
Full Report: https://blog.malwarebytes.com/threat-ana...port-scam/


![[-]](https://www.geeks.fyi/images/collapse.png)

