Fake Internet ads entice surfers to install rogue Flash Player

You may have experienced a situation, where a site may have asked you to install a third-party software like Adobe Flash Player or Silverlight, in order to be able to view a video. taking advantage of this familiarity factor, some malicious ads are enticing web surfers to download and install a fake free Media Player, which is being distributed via a rogue Adobe Flash Played advertisement.


Webroot a well-known security company, picked up such ads which were being distributed through the YieldManager Ad Network. The ads exposed surfers to a fake Adobe Flash Player. It asked users to download and install an Adobe Flash Player HD in order to watch HD movies online.

Once users clicked on the ad, they were presented with a rogue free Media Player page. There was no damage to the users till this time. But those users who fell victim to this and clicked on the free Download button, ended up having malware and potentially unwanted software on their computers.

The day this rogue ad was found, only 8 out of 46 antivirus software had the capability to detect this rogue media player – also called as Somoto BetterInstaller; Adware.Somoto/TROJ_GEN.F47V0429, says Webroot.

The affiliate network participant that’s abusing the YieldManager ad network is currently earning revenue through the Somoto’s BetterInstaller PPI (Pay-Per-Install) revenue sharing network.

Stay safe!

Posted by with Tags
Anand Khanse is the Admin of TheWindowsClub.com, a 10-year Microsoft MVP Awardee in Windows (2006-16) & a Windows Insider MVP. He enjoys following and reporting Microsoft news and developments in the world of Personal Computing & Social Media.


  1. Hugh

    So, how do I get rid of it. I am not opening it, but it keeps popping up while I am using the Internet Explorer 9 browser.

  2. Check if you can uninstall it via the Control Panel. Else use a good anti-malware remover.

Leave a Reply

Your email address will not be published. Required fields are marked *

7 + 1 =