• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69

    The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69
  • The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

    The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39
  • The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

    The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59
  • Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

    Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

New Malvertising Campaign via Google Ads Targets Users Searching for Popular Software

Dec 29, 2022 by iHash Leave a Comment

Dec 29, 2022Ravie LakshmananOnline Security / Malvertising

Users searching for popular software are being targeted by a new malvertising campaign that abuses Google Ads to serve trojanized variants that deploy malware, such as Raccoon Stealer and Vidar.

The activity makes use of seemingly credible websites with typosquatted domain names that are surfaced on top of Google search results in the form of malicious ads by hijacking searches for specific keywords.

The ultimate objective of such attacks is to trick unsuspecting users into downloading malevolent programs or potentially unwanted applications.

In one campaign disclosed by Guardio Labs, threat actors have been observed creating a network of benign sites that are promoted on the search engine, which when clicked, redirect the visitors to a phishing page containing a trojanized ZIP archive hosted on Dropbox or OneDrive.

“The moment those ‘disguised’ sites are being visited by targeted visitors (those who actually click on the promoted search result) the server immediately redirects them to the rogue site and from there to the malicious payload,” researcher Nati Tal said.

CyberSecurity

Among the impersonated software include AnyDesk, Dashlane, Grammarly, Malwarebytes, Microsoft Visual Studio, MSI Afterburner, Slack, and Zoom, among others.

Guardio Labs, which has dubbed the campaign MasquerAds, is attributing a huge chunk of the activity to a threat actor it is tracking under the name Vermux, noting that the adversary is “abusing a vast list of brands and keeps on evolving.”

The Vermux operation has mainly singled out users in Canada and the U.S., employing masquerAds sites tailored to searches for AnyDesk and MSI Afterburner to proliferate cryptocurrency miners and Vidar information stealer.

The development marks the continued use of typosquatted domains that mimic legitimate software to lure users into installing rogue Android and Windows apps.

It’s also far from the first time the Google Ads platform has been leveraged to dispense malware. Microsoft last month disclosed an attack campaign that leverages the advertising service to deploy BATLOADER, which is then used to drop Royal ransomware.

BATLOADER aside, malicious actors have also used malvertising techniques to distribute the IcedID malware via cloned web pages of well-known applications such as Adobe, Brave, Discord, LibreOffice, Mozilla Thunderbird, and TeamViewer.

“IcedID is a noteworthy malware family that is capable of delivering other payloads, including Cobalt Strike and other malware,” Trend Micro said last week. “IcedID enables attackers to perform highly impactful follow through attacks that lead to total system compromise, such as data theft and crippling ransomware.”

The findings also come as the U.S. Federal Bureau of Investigation (FBI) warned that “cyber criminals are using search engine advertisement services to impersonate brands and direct users to malicious sites that host ransomware and steal login credentials and other financial information.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: ads, campaign, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, google, hacker news, hacking news, how to hack, information security, malvertising, network security, popular, ransomware malware, searching, software, software vulnerability, targets, the hacker news, Users

Special Offers

  • The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

    The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49
  • The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69

    The 2023 All-In-One Raspberry Pi & Arduino Developer Bundle for $69
  • The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39

    The 2023 Complete Project Management Agile & Scrum Mastery Platinum Bundle for $39
  • The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

    The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59
  • Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

    Apple iPad Pro 3rd Gen 12" 4GB RAM 256GB SSD – Space Gray (Refurbished: Wi-Fi Only) for $687

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Acceldata and its Data Observability Platform – Solving Big Data Management Challenges

Mar 28, 2023 By iHash

Apple introduces Apple Pay Later

Mar 28, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

How to restore information in an edited screenshot

How to restore information in an edited screenshot

You might think that hiding sensitive information in a picture is a cakewalk. Just blot out your secrets with a big black marker in any image editor. Or even better: just crop the bit of the photo or screenshot that contains your personal data. What could possibly go wrong? Quite a lot, in fact. We’ve […]

Stealthy DBatLoader Malware Loader Spreading Remcos RAT and Formbook in Europe

Mar 28, 2023Ravie LakshmananMalware Attack / Hacking A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware loader dubbed DBatLoader. “The malware payload is distributed through WordPress websites that have authorized SSL certificates, which is a common tactic used by threat actors to evade detection […]

The 2023 Complete AWS Cloud Engineer, Developer & Architect Course Bundle for $49

Expires March 24, 2024 23:59 PST Buy now and get 98% off AWS Blockchain as a Service2 KEY FEATURES This course has been designed for anyone who would like to grasp how a blockchain as a service works on AWS. AWS is the world’s most popular and longest-running cloud platform provider it is important to […]

Scale to Survive: How to Attract Investors in a Post-SVB World

The bigger they come, the harder they fall… unless the Federal Reserve steps in to bail them out. That was the good news for depositors in the now-defunct Silicon Valley Bank, which imploded in a brutal 48-hour run last week. But bond and stockholders lost their hats. The message to innovators is clear: If you […]

The 2023 Ultimate Artificial Intelligence & Automation Developer Bundle for $59

Expires March 27, 2123 23:59 PST Buy now and get 97% off Introduction to the Latest Artificial Intelligence Tools KEY FEATURES Whether you like it or not….artificial intelligence is here.​ It’s already changing the way we function in our personal lives (even if you might not realize it yet). And It’s already having a massive […]

Microsoft Issues Patch for aCropalypse Privacy Flaw in Windows Screenshot Tools

Mar 27, 2023Ravie LakshmananPrivacy / Windows Security Microsoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool for Windows 10 and Windows 11. The issue, dubbed aCropalypse, could enable malicious actors to recover edited portions of screenshots, potentially revealing sensitive information that may have been cropped out. Tracked as […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT