• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $89

    VPN Unlimited: Lifetime Subscription for $89
  • Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399

    Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399
  • Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

    Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369
  • Anker 313 Power Bank (PowerCore 10K) for $27

    Anker 313 Power Bank (PowerCore 10K) for $27
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

A Stealthy, Financial Trojan and Info Stealer Delivered through Google Ads

May 2, 2023 by iHash Leave a Comment

May 02, 2023Ravie LakshmananMalvertising / Cyber Threat

Google Ads

In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat actor has been observed leveraging the technique to deliver a new Windows-based financial trojan and information stealer called LOBSHOT.

“LOBSHOT continues to collect victims while staying under the radar,” Elastic Security Labs researcher Daniel Stepanic said in an analysis published last week.

“One of LOBSHOT’s core capabilities is around its hVNC (Hidden Virtual Network Computing) component. These kinds of modules allow for direct and unobserved access to the machine.”

The American-Dutch company attributed the malware strain to a threat actor known as TA505 based on infrastructure historically connected to the group. TA505 is a financially motivated e-crime syndicate that overlaps with activity clusters tracked under the names Evil Corp, FIN11, and Indrik Spider.

Cybersecurity

The latest development is significant because it’s a sign that TA505, which is associated with the Dridex banking trojan, is once again expanding its malware arsenal to perpetrate data theft and financial fraud.

LOBSHOT, with early samples dating back to July 2022, is distributed by means of rogue Google ads for legitimate tools like AnyDesk that are hosted on a network of lookalike landing pages maintained by the operators.

The malware incorporates dynamic import resolution (i.e., resolving the names of necessary Windows APIs at runtime), anti-emulation checks, and string obfuscation to evade detection by security software.

Once installed, it makes Windows Registry changes to set up persistence and siphons data from over 50 cryptocurrency wallet extensions present in web browsers like Google Chrome, Microsoft Edge, and Mozilla Firefox.

Google Ads

LOBSHOT’s other notable features revolve around its ability to remotely access the compromised host via an hVNC module and stealthily perform actions on it without attracting the victim’s attention.

“Threat groups are continuing to leverage malvertising techniques to masquerade legitimate software with backdoors like LOBSHOT,” Stepanic said.

“These kinds of malware seem small, but end up packing significant functionality which helps threat actors move quickly during the initial access stages with fully interactive remote control capabilities.”

UPCOMING WEBINAR

Learn to Stop Ransomware with Real-Time Protection

Join our webinar and learn how to stop ransomware attacks in their tracks with real-time MFA and service account protection.

Save My Seat!

The findings also underscore how an increasing number of adversaries are adopting malvertising and search engine optimization (SEO) poisoning as a technique to redirect users to fake websites and download trojanized installers of popular software.

According to data from eSentire, the threat actors behind GootLoader have been linked to a string of attacks targeting law firms and corporate legal departments in the U.S., Canada, the U.K., and Australia.

GootLoader, active since 2018 and which functions as an initial access-as-a-service operation for ransomware attacks, employ SEO poisoning to entice victims searching for agreements and contracts to infected WordPress blogs that point to links containing the malware.

Besides implementing geofencing to target victims in select regions, the attack chain is designed such that the malware can only be downloaded once per day from the hijacked sites in order to elude discovery by incident responders.

GootLoader’s use of the IP address method to screen already hacked victims, eSentire found, could be used against it to preemptively block the end users’ IP addresses and prevent organizations from potential infections.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: ads, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, Delivered, financial, google, hacker news, hacking news, how to hack, Info, information security, network security, ransomware malware, software vulnerability, stealer, Stealthy, the hacker news, Trojan

Special Offers

  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $89

    VPN Unlimited: Lifetime Subscription for $89
  • Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399

    Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399
  • Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

    Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369
  • Anker 313 Power Bank (PowerCore 10K) for $27

    Anker 313 Power Bank (PowerCore 10K) for $27

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Heard on the Street – 6/5/2023

Jun 5, 2023 By iHash

Passwarden PW Manager Lifetime Subscription for $79

Jun 5, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

Dotan Horovits

From Spotify to Open Source: The Backstory of Backstage

Technology juggernauts–despite their larger staffs and budgets–still face the “cognitive load” for DevOps that many organizations deal with day-to-day. That’s what led Spotify to build Backstage, which supports DevOps and platform engineering practices for the creation of developer portals. Eventually, Spotify made the decision to open source Backstage and donate it to the Cloud Native […]

VPN Unlimited: Lifetime Subscription for $89

Expires June 04, 2024 23:59 PST Buy now and get 55% off KEY FEATURES VPN Unlimited is the ultimate solution for enhancing your online security and privacy. With top-notch encryption algorithms and over 3000 secure servers in 80+ locations worldwide, it effectively masks your IP address and protects your sensitive information from prying eyes. Whether […]

Magento, WooCommerce, WordPress, and Shopify Exploited in Web Skimmer Attack

Jun 05, 2023Ravie LakshmananWebsite Security / Magecart Cybersecurity researchers have unearthed a new ongoing Magecart-style web skimmer campaign that’s designed to steal personally identifiable information (PII) and credit card data from e-commerce websites. A noteworthy aspect that sets it apart from other Magecart campaigns is that the hijacked sites further serve as “makeshift” command-and-control (C2) […]

Anker 313 Power Bank (PowerCore 10K) for $27

Expires May 30, 2123 05:12 PST Buy now and get 0% off PRODUCT SPECS Quality Throughout:Built adventure-tier touch with superior durability and scratch resistance, Anker 313 Power Bank (PowerCore 10K) is premium both inside and out. Slim Size, Big Power:One of the slimmest and lightest 10,000mAh portable chargers on the market. Provides 2.25 charges for […]

Secrets to successful engineering leadership from Elastic’s Simona Posea

Secrets to successful engineering leadership from Elastic’s Simona Posea

For Simona Posea, visualizing a career in technology came easily. “My mother was a role model, as she’s been working with computers since punch cards were a thing,” Simona laughs. “We had our first PC when I was six years old, and she taught us how to operate it. At the time, I would use […]

Video Highlights: Fine Tune GPT-J 6B in Under 3 Hours on IPUs

Did you know you can run GPT-J 6B on Graphcore IPU in the cloud? Following the now infamous leaked Google memo, there’s been a real storm in the AI world recently around smaller, open source language models, like GPT-J, that are cheaper and faster to fine-tune, run and perform just as well as larger models […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT