Malvertisers zoom in on cryptocurrencies and initial access
Discription

During the past month, we have observed an increase in the number of malicious ads on Google searches for "Zoom", the popular piece of video conferencing software. Threat actors have been alternating between different keywords for software downloads such as "Advanced IP Scanner" or "WinSCP" normally geared towards IT administrators. While Zoom is used by millions of people around the world, these campaigns are likely targeting victims who are into cryptocurrencies as well as corporate users, in order to gain access to company networks. In this blog post, we chose to highlight two cases: Case #1 is about a new loader which we have not seen mentioned publicly before called HiroshimaNukes. It drops an additional payload designed to steal user data. Case #2 is a campaign dropping FakeBat loader where the threat actor tracked victims via a panel that was new to us, called Hunting panel 1.40. FakeBat is often used by threat actors as the initial entry point for hands on keyboard operations. We have reported the malicious ads to Google. Advertiser profiles The threat actors are using a number of fake identities to create multiple advertiser accounts. We noticed that different ads had different advertiser IDs but the backend infrastructure was the same. Fake advertiser profiles They are also using what looks like existing advertising accounts (one of the accounts had over 30K ads) which may have been compromised: Advertising account possibly hacked to insert malicious Zoom ad…Read More

Back to Main

Subscribe for the latest news: