Search This Blog

Powered by Blogger.

Blog Archive

Labels

About Me

Showing posts with label Malvertising. Show all posts

Smokedham: Malicious Backdoor for Surveillance and Ransomware Campaigns

Smokedham: Malicious Backdoor for Surveillance and Ransomware Campaigns

A study by TRAC Labs reveals details about a backdoor called “SMOKEDHAM”, a malicious tool used by hacker UNC2465. The financially motivated attacker has been in action since 2019, the SMOKEDHAM tool plays a main role in sophisticated extortion and launching ransomware attacks, making UNC2465 the most adaptive and persistent threat group in the cybersecurity environment.

About Smokedham malware

SMOKEDHAM is a highly adaptable backdoor planted through trojanized software installers and strives via malvertising campaigns. “UNC2465 has leveraged trojanized installers disguised as legitimate tools, such as KeyStore Explorer and Angry IP Scanner, to deliver SMOKEDHAM payloads,” says TRAC Labs.

Once deployed, SMOKEDHAM allows hackers initial entry to a victim’s device, making way for network surveillance, later movements, and deploying ransomware. If we look back, SMOKEDHAM has links with DARKSIDE ransomware, and UNC2465 has now shifted focus to Lockbit ransomware.

When infecting the target system, SMOKEDHAM uses stealthy techniques, this includes DLL side-loading and PowerShell obfuscation. 

Important steps in the infection process include: 

Manipulating Service: The backdoor changes configurations of Windows services like MSDTC to maintain presence and exploit privileges. “The purpose of running these commands is to later DLL side-load the binary named oci.dll retrieved from the C2 server.”

Trojanized Installers: Distributed through famous platforms like Google Ads, these trojan installers may look legit but contain a malicious SMOKEDHAM payload.

Registry and Batch Script Modifications: Infected scripts run payloads, and configure registry keys for maintaining presence, and also make PowerShell commands for obfuscation. 

For post-campaign activities, the attacker uses:

1. Using tools such as Advanced IP Scanner and Bloodhound to track valuable targets in a compromised network. 

2. Credential Harvesting: Extracting login credentials for future exploitation. 

3. Escaping Firewall: Using NGROK to leak internal services like RDP to the web, evading network defenses. 

“Approximately 6 hours after the execution of the malicious binary on the beachhead host, the threat actors moved laterally to the Domain Controller using WMI,” says TRAC labs.

The SMOKEDHAM backdoor is a living example of sophisticated cyber threats corrupting the cybersecurity industry, with its advanced tools for surveillance, network infiltration, and persistence.

How to Protect Your Brand from Malvertising: Insights from the NCSC

How to Protect Your Brand from Malvertising: Insights from the NCSC

Advertising is a key driver of revenue for many online platforms. However, it has also become a lucrative target for cybercriminals who exploit ad networks to distribute malicious software, a practice known as malvertising. The National Cyber Security Centre (NCSC) has been at the forefront of combating this growing threat, providing crucial guidance to help brands and advertising partners safeguard their campaigns and protect users.

What is Malvertising?

Malvertising refers to the use of online advertisements to spread malware. Unlike traditional phishing attacks, which typically rely on deceiving the user into clicking a malicious link, malvertising can compromise users simply by visiting a site where a malicious ad is displayed. This can lead to a range of cyber threats, including ransomware, data breaches, and financial theft.

The Scope of the Problem

The prevalence of malvertising is alarming. Cybercriminals leverage the vast reach of digital ads to target a large number of victims, often without their knowledge. According to NCSC, the complexity of the advertising ecosystem, which involves multiple intermediaries, exacerbates the issue. This makes identifying and blocking malicious ads challenging before they reach the end user.

Best Practices for Mitigating Malvertising

To combat malvertising, NCSC recommends adopting a defense-in-depth approach. Here are some best practices that organizations can implement:

  • Partnering with well-established and trusted ad networks can reduce the risk of encountering malicious ads. Reputable networks have stringent security measures and vetting processes in place.
  • Conducting regular security audits of ad campaigns can help identify and mitigate potential threats. This includes scanning for malicious code and ensuring that all ads comply with security standards.
  • Ad verification tools can monitor and block malicious ads in real-time. These tools use machine learning algorithms to detect suspicious activity and prevent ads from being displayed to users.
  • Educating users about the dangers of malvertising and encouraging them to report suspicious ads can help organizations identify and respond to threats more effectively.
  • Ensuring that websites are secure and free from vulnerabilities can prevent cybercriminals from exploiting them to distribute malvertising. This includes regularly updating software and using robust security protocols.

Case Studies of Successful Mitigation

Several organizations have successfully implemented these best practices and seen significant reductions in malvertising incidents. For example, a major online retailer partnered with a top-tier ad network and implemented comprehensive ad verification tools. As a result, they were able to block over 90% of malicious ads before they reached their customers.

Marko Polo Infostealer Campaigns Target Thousands Across Platforms

 

The cybercriminal group “Marko Polo” is behind a major malware operation, running 30 infostealer campaigns targeting a wide array of victims. Using techniques such as spear-phishing, malvertising, and brand impersonation, the group spreads over 50 malware payloads, including AMOS, Stealc, and Rhadamanthys, across different sectors like gaming, cryptocurrency, and software. 

According to Recorded Future’s Insikt Group, Marko Polo’s campaigns have compromised thousands of devices globally, posing a significant threat to consumer privacy and business security, with potential financial losses in the millions. The group primarily uses spear-phishing tactics via direct messages on social media, targeting high-value individuals like cryptocurrency influencers, gamers, and software developers. 

They impersonate popular brands such as Fortnite, Zoom, and RuneScape, creating fake job offers and project collaborations to deceive victims into downloading malware. In addition to these impersonations, Marko Polo even fabricates its own brand names like VDeck, Wasper, and SpectraRoom to lure unsuspecting users. The Marko Polo operation is highly versatile, capable of infecting both Windows and macOS platforms. On Windows, they use a tool called “HijackLoader” to deliver malware like Stealc, designed to extract data from browsers, and Rhadamanthys, which targets a wide array of applications and data types. 

Rhadamanthys has also added advanced features, such as a cryptocurrency clipper to redirect payments to the attackers’ wallets, and the ability to evade Windows Defender. When it comes to macOS, the group deploys Atomic (AMOS), an infostealer launched in 2023, which they rent out to cybercriminals for $1,000 per month. AMOS is highly effective at extracting sensitive data stored on macOS systems, such as Apple Keychain passwords, MetaMask seeds, WiFi credentials, credit card details, and other encrypted information. 

The Marko Polo campaign’s widespread nature highlights the dangers of information-stealing malware, and users need to be vigilant against unsolicited links and downloads from unknown sources. One of the most effective ways to protect against such malware is to download software exclusively from official websites and ensure your antivirus software is up-to-date. This ensures the detection of malicious payloads before they can compromise your system. 

Information-stealing malware campaigns are becoming increasingly common, with Marko Polo’s operation serving as a stark reminder of the sophisticated tactics cybercriminals employ today. These stolen credentials often enable hackers to breach corporate networks, engage in data theft, and disrupt business operations. Therefore, cybersecurity awareness and strong preventive measures are crucial for protecting against such malicious activities.

Malvertising and Cybercrime in Online Advertising

 


When it comes to cyber threats, judging the threat by its name can be an imaginary endeavour. As the term "malvertising", a portmanteau of the term "malicious advertising", is always presented with the implication that it overlaps with ads, even dodgy ones, and, therefore, the fallacy that its impact rarely extends past the level of frustration might be reinforced.

In consequence, those who do not have a lot of experience might get the impression that there is no big deal, but in actuality, there is no doubt that this is something to be cautious about. Because every brand's success depends on maintaining a strong online presence in this day and age, advertisers must learn how to usurp social media and search engines to reach a wider audience. Almost every minute of every day, LED ads are bombarding smartphone screens throughout the world with sponsorships that are part of the modern advertising landscape.   

There is, however, an element of deception within these ads that appears to make them seem very innocent. Malvertising, which is the act of spreading malware through digital ads on reputable websites, has become a rising trend because criminals target reputable websites with nefarious intentions. Several websites, both big and small, have started to use these ads to steal sensitive information from users by misleading them through deceptive websites and directing them to malicious content disguised as harmless content to steal information about them. 

In today's era where it is imperative for advertising to maintain a strong digital presence to achieve success, advertisers are now adept at harnessing social media and search engines to reach as many consumers as possible. Advertisements on digital media dominate the modern marketing landscape, and sponsored ads can be seen all over the smartphone screen every second of the day on any device.  Even though these ads appear to be sheepskins, they are wolves. 

There has been a growing trend in recent years of malvertising in which cyber criminals spread malware via various types of digital advertisements on reputable websites as a part of their malicious marketing operations. Using the illusion that a user trusts a familiar brand, these ads hide sensitive information by leading them to deceptive websites and leading them to download malware hidden in harmless-looking content. 

Such ads are designed to ruin users' experience and steal users' information. The term malvertising is formed from the combination of malicious and advertising, as it relates to the act of using ads to disseminate malware through online advertisements. A sophisticated cyber threat, phishing refers to the strategy of exploiting the trust that users have placed in online advertising to gain access to their systems and networks. 

Oftentimes, malicious advertising campaigns are delivered through legitimate ad networks, which makes it particularly tough for marketing companies to detect and mitigate attacks. It can be argued that malvertising at its core involves injecting malicious code or links into online advertisements, which, in the case of advertising, can result in users downloading malware onto their devices or being redirected to malicious websites unintentionally. 

This program can be classified into several categories such as adware, spyware, ransomware, and banking trojans, all of which are hazardous forms of malware. By the time a website visitor clicks on the ad, the corrupted code will install adware, malware, or other malicious software onto their computer as soon as they click the ad. Moreover, the attacker could also spoof or leverage social engineering techniques to advance the attack through redirection of the user to a malicious website. 

There is also a possibility that malicious advertising attacks may execute an exploit kit, which is a form of malware that is designed to scan the system for vulnerabilities and exploit those weaknesses to compromise the system. As soon as a malware program is downloaded via a malvertising attack, it operates identical to a normal malware program, once installed. This type of software can damage files, redirect internet traffic, track the user's activity, steal sensitive data, or create backdoors that allow users to access the computer through other systems. 

There are also other ways in which malware can be used, including deleting, blocking, modifying, leaking, or copying data, so that it can either be sold back to the user for ransom or on the dark web for profit. In the past, threat actors have exploited legitimate advertising networks to dish out their malicious content via banner ads, pop-up windows, or embedded scripts that were placed on trusted web pages by malware actors. 

Frequently, these ads are targeted at specific demographics or interests to increase the chances that they will be clicked by users. The user, if caught on the hook, will initially be redirected to a landing page or prompted to download an ostensibly harmless file to continue with the process. As a result, a very sketchy piece of code is executed that installs viruses, ransomware, spyware, or adware without their knowledge. 

There are a variety of ways in which cybercriminals can exploit a compromised device to carry out fraud, steal personal information, distribute malware, recruit it into a botnet, or encrypt data and hold it for ransom. Fast-flux logic is used to modify the IP address of the malicious Command and Control (C2) infrastructure to prevent the attacker from tracing the attacker back to the organization that perpetrated the attack.

Types of Marketing There are several different types of malvertising and not all of them function in the same way. The following are the main types of hacking tactics that are employed by hackers: The presence of drive-by downloads, which only require the user to load the webpage, triggers a malware download without them having to click on anything to complete the process. 

It is possible to get tricked into installing a fake software update, such as a security patch, or an update for Flash Player, based on the appearance of a critical update, which is malware, when in fact it is only an ad. A phishing ad is an advertising campaign that pretends to be coming from a trustworthy company or service to steal sensitive information such as a password or credit card number from users' computers.

It's called cryptojacking, and it involves the use of malicious ads to steal users' devices' processing power to mine cryptocurrencies in the background without their knowledge, resulting in slow and unresponsive systems. Redirects to malicious domains. In some instances, users are automatically taken to sites that attempt to gather data about users by directing them to suspicious domains or phishing sites. 

By exploiting Zero-Day Vulnerabilities, hackers are capable of installing malware on users' computers through browsers or operating systems, which allows them to bypass browser security patches and install malware on their computers. Several malvertising campaigns tend to distribute ransomware which provides users with the possibility of locking their devices and demanding payment to unlock them. 

Such methods have been effective in spreading some of the most notorious strains of malware, such as TeslaCrypt and CryptoWall. Malvertisements, or malicious advertisements, possess several distinct characteristics that make them identifiable when individuals are aware of the warning signs. Common indicators include advertisements that appear sloppy or unprofessional, those containing spelling errors, and ads making unrealistic promises, such as miraculous cures or sensational claims. 

Furthermore, advertisements focused on celebrity scandals or offering deals that seem too good to be true should raise suspicion. Another red flag is when ads do not align with a user’s recent search activity or online behaviour. While malvertising often goes unnoticed compared to more overt cyber threats like ransomware or information-stealing campaigns, this perception is misleading. In reality, these cyberattacks often overlap. 

Malicious advertisements not only present themselves as nuisances but also serve as potential launchpads for more severe and damaging compromises. This threat is amplified by social engineering tactics, hacking techniques, and the abuse of legitimate online services, which collectively make this form of cybercrime highly effective. The good news is that malvertising scams are relatively easy to avoid with proper caution and awareness.

Individuals are advised to exercise reasonable scepticism toward advertisements that make unrealistic promises, contain typographical errors, or seem unrelated to their recent online activity. In addition, users should verify the URLs of landing pages after clicking on advertisements to ensure their legitimacy. 

Disabling autoplay for video content in browsers is another useful precautionary measure. Installing an ad-blocking extension and maintaining up-to-date antivirus software can also significantly reduce exposure to malvertising, as these tools are highly effective at intercepting and preventing malicious ads from causing harm. 

Despite the availability of preventative measures, malvertising is an evolving threat. As cybersecurity defences become more advanced, so too do the tactics employed by cybercriminals. However, the introduction of AI-powered security tools offers new hope in the fight against malvertising. Companies such as Confiant and GeoEdge are leveraging machine learning algorithms to detect and block malicious advertisements before they can reach users, enhancing online safety.

The Rise of Malvertising: How Scammers Target Google Products with Malicious Search Ads

The Rise of Malvertising: How Scammers Target Google Products with Malicious Search Ads

Cybersecurity keeps evolving, and so do threats. One such threat is malvertising, it exploits the tools made for enhancing our digital threats. A recent campaign has surfaced, targeting Google products through malicious search ads, displaying the persistence and sophistication of threat attackers. The blog dives into the details of this campaign, its impact, and the steps users can take to protect themselves.

Malvertising, which comes from malicious + advertising involves the use of online advertisements to spread malware. Cybercriminals purchase ad space on legitimate websites, embedding malicious code within the ads. When users click these ads, they are redirected to malicious websites or have malware silently installed on their devices.

The Campaign Against Google Products

The recent campaign showcases the ingenuity of cybercriminals. By targeting dozens of Google products through malicious search ads, scammers managed to deceive users into visiting a fake Google homepage. This fake page, created using Looker Studio, was designed to lock up the browsers of both Windows and Mac users, effectively trapping them in a malicious environment.

The attackers utilized stolen or free accounts and leveraged Google's APIs to generate rotating malicious URLs. This tactic made it difficult for security systems to detect and block malicious ads and ensured a steady stream of potential victims.

The Mechanics of the Attack

1. Ad Placement: Cybercriminals purchased ad space on legitimate platforms, ensuring their malicious ads appeared in search results for popular Google products.

2. Redirection: When users clicked on these ads, they were redirected to a fake Google homepage. This page was meticulously crafted to resemble the genuine Google site, adding a layer of credibility to the scam.

3. Browser Lock: The fake homepage employed scripts to lock the user's browser, preventing them from navigating away or closing the tab. This tactic often creates a sense of urgency and panic, compelling users to follow the attackers' instructions.

4. Rotating URLs: By using Google's APIs, the attackers generated rotating URLs, making it challenging for security systems to blacklist the malicious sites. This ensured the longevity and effectiveness of the campaign.

What it means for Users

The impact of such a campaign is far-reaching. Users who fall victim to these scams can experience a range of consequences, from minor annoyances to significant security breaches. The immediate impact includes browser hijacking, which can disrupt productivity and cause frustration. However, the long-term consequences can be more severe, including the installation of malware, theft of personal information, and financial loss.

How to stay safe

  • Ad blockers can prevent malicious ads from appearing in your search results and on websites you visit. While not foolproof, they add an extra layer of security.
  • Before clicking on any ad, hover over the link to see the URL. Ensure it matches the official website of the product or service you are interested in.
  • Regularly update your browser, operating system, and security software. Updates often include patches for vulnerabilities that cybercriminals exploit.
  • Utilize built-in security features in your browser and operating system. Features like pop-up blockers and safe browsing modes can help mitigate the risk of malvertising.
  • Stay informed about the latest cybersecurity threats and trends. Awareness is a powerful tool in preventing cyberattacks.

Hackers are Using Fake PC News Website to Distribute Infostealers

 

Researchers made an effort to warn users last year not to click on Google Ads in search results, but it appears those warnings went unheeded, as hackers continue to use malicious ads to infect unsuspecting users with malware. 

Malvertising, or malicious advertising, has grown in popularity among cybercriminals as phishing attacks and malicious apps have become less effective. Instead, hackers are now purchasing advertising space on Google Search and other search engines in order to trick users into installing malware. 

One way they do this is by imitating well-known brands. So far, we've seen hackers pose as Amazon, USPS, CCleaner, Notepad++, and other prominent brands. According to a report from the email security firm Vade, Facebook and Microsoft continue to be the most impersonated brands since 2020. 

Unsuspecting PC users who click on an advertisement in this new campaign are led to a fake download portal that looks authentic to the unwary eye. Instead of CPU-Z, though, the website offers a digitally signed MSIX installer that includes a malicious PowerShell script for the FakeBat loader. 

Malware loaders, as their name implies, are similar to malware droppers on your smartphone in that they are used to infect your computer with malicious software. This loader downloads and installs the Redline stealer onto a targeted PC. The personal information of a victim can be acquired through this malware via the theft of credit card numbers, VPN passwords, saved passwords, system data, cryptocurrency wallets, browser histories, and cookies. 

Another intriguing aspect of this campaign is that not every user who clicks on these malicious CPU-Z advertisements is redirected to a fake download page. Those who aren't being targeted are instead directed to what looks to be a typical blog with several articles on it.

Mac Users Under Attack: Malvertising Campaign Distributing Atomic Stealer Malware

 


An updated version of macOS stealer malware called Atomic Stealer (or AMOS) is being distributed through a new malvertising campaign. The authors of the program appear to be actively maintaining and updating malware. 

When the creators of AMOS found a way to advertise this tool for $1,000 per month in the spring of 2023, they claimed that it would allow the theft of a wide range of data. It was not long after that that the wild was inundated with new variants of malware that were armed with a large number of new spying features, targeting gamers and cryptocurrency investors. 

According to the malware's authors, the malware can be used to steal keychain passwords, browser information, cryptocurrency wallets, and other files from a compromised device, among other things.  The company recently observed that although AMOS was originally distributed through cracked software downloads, it has now been discovered to have been delivered through a malvertising campaign, according to Malwarebytes. 

An unknown entity in Belarus appears to have hacked into a Google advertiser account and used it to advertise the TradingView financial market tracking app through a fake website for a real financial market tracking app. It has been reported that cybercriminals are increasingly deploying data-stealing malware against Apple computers in order to steal confidential information. 

Cybersecurity company SentinelOne reported Wednesday that it spotted a new version of one of the macOS infostealers, Atomic Stealer. The new version of Atomic Stealer is the third version of the malware that works on macOS in a variety of ways. 

According to SentinelOne, the latest version is really going after gaming and cryptocurrency users with a particular focus on the data that it's trying to obtain, which has not been described before in any detail. This infostealer, which is also known as the Atomic Stealer, or AMOS for short, was first described as macOS-based malware that focuses initially on cryptocurrencies, passwords, and important files that are encrypted. 

Throughout its evolution, it has become capable of grabbing more information and targeting a wider range of operating systems. As a result of such an advertisement, a user is directed to a site that offers a number of download options for NetSupport RAT for various operating systems, and while both the Windows and Linux download links direct users to download an MSIX installer that will install the NetSupport RAT on their computers. 

In a Malwarebytes report, clicking the macOS download link causes an Atomic Stealer to be downloaded and it attempts to exfiltrate data stored in iCloud Keychains, browsers, and user files. Several security experts have touted the new infostealer as having evasion capabilities to beat Gatekeeper protections, and this comes in the wake of increasing numbers of Mac OS X-targeted infostealer attacks. 

The criminals who purchase the toolkit are mainly distributing it via cracked software downloads, but they take the liberty to impersonate legitimate websites and to use advertising on search engines like Google to make their victims fall for their schemes. This attack attempts to bypass the Gatekeeper security mechanism in macOS in order to be able to exfiltrate the stolen data to a server under the attacker's control by bypassing Gatekeeper protections. 

As Mac OS continues to become a popular target for malware attacks, a number of new data-stealing apps targeting Mac OS have appeared for sale in crimeware forums over the past couple of months to take advantage of the wide availability of Apple systems in organizations as a target of malware attacks. When looking to download a new program, users are likely to turn to Google and run a search for the particular program that they require. 

As a result, threat actors are purchasing ads matching well-known brands and are tricking victims into visiting their site with the false impression that it is the official website of that brand. There are instructions in the downloaded file on how to open it so that it can bypass GateKeeper, Apple's built-in security system, to bypass the security lock. 

Further, according to the researchers, the malware is embedded in ad-hoc signed applications, which means that the revocation of the certificates used to sign the apps is not possible since they are not Apple certificates. The moment the victim runs the program, it immediately sends the stolen data to the attacker's C2 servers as soon as the data is stolen.

Passwords, information about users, wallets, cookies, keychains, and browser auto-fills are just some of the things that Atomic Stealer steals from users.  As a precautionary measure, Malwarebytes recommends that users check that any program they run on an endpoint is properly signed before running it. 

A further step that should be taken is to analyze the website from which the program was downloaded since it is possible that the address of the website has been typographical. In addition, it is possible that the content of the website reveals a scam.  

There has been increasing evidence that Google Ads are being used by spammers to spread rogue installers to victims looking for popular software, either legitimate or cracked, on search engines. The bogus Google Ads are shown to users searching for software on search engines that aren't securing legitimate software. 

An online campaign targeting the TradingView software was launched recently, featuring a fraudulent web page featuring a prominently displayed button for downloading the software for Windows, macOS, and Linux operating systems. 

The Stroz Friedberg Incident Response Services of Aon said last month that new versions of DarkGate have been used in attacks launched by threats employing tactics similar to Scattered Spider, which is a threat response technique used by cybercriminals.

Malvertising Gives Cybercriminals Access to Big Technologies

Malvertising has been a more popular tool employed by cybercriminals in recent years to exploit unsuspecting internet users. When people click on an infected ad, malware is transferred to their computers and mobile devices, which is known as malvertising. Sadly, some contend that Big Tech's corporate policies are facilitating hackers' use of malvertising as a means of infiltrating computer systems.

According to columnist Candice Rivera, "Big Tech's business model is dependent on targeted advertising, which means collecting data on users and their interests to serve them ads. However, this also means that ads can be targeted to specific users based on their vulnerabilities." Cybercriminals are taking advantage of this practice by purchasing ad space and using it to spread malware to specific groups of people.

In a recent article on Security Boulevard, the author suggests that one way to defeat malvertising-based phishing attacks is to 'use ad-blocking software, which can prevent ads from being displayed altogether.' While this may be an effective solution, it does not address the root cause of the problem, which is the business practices of Big Tech companies. 

The use of malvertising has become so widespread that even popular search engines like Google have become vulnerable to attacks. As reported by Ars Technica, "Google recently warned users to be cautious when downloading software from its search engine, as some downloads may contain malware." This highlights the need for users to exercise caution when browsing the internet, even when using well-known and trusted search engines.

CSO Online provides recommendations to internet users to protect themselves from malvertising-based attacks. They suggest keeping the software and operating systems updated, using antivirus software, and installing ad-blocking software. Moreover, it is essential to exercise caution while clicking on links or downloading files from unknown websites.  

While malvertising has become a serious threat to internet users, it is important to recognize the role that Big Tech's business practices play in enabling cyber criminals. As users, we must take responsibility for our own online security and take steps to protect ourselves from these types of attacks.