th3_protoCOL, to random

WinSCP is a popular target for malware campaign abusing google ads. Here's one from this morning:

  1. Google search for winscp
  2. Click the first link, user redirection
    ➡️​ winscp-eng[.]org
    ➡️​ winscp-static-746341.c.cdn77[.]org
  3. Button click, malware download
    ➡️​ https[:]//parsecworks[.]org/us/downloads/WinSCP-6.1.2-Setup.exe

https://www.virustotal.com/gui/file/b503e810b31151f8d79bc0db2b46daddc53f27a2fd741c30355726892591e5b3/detection

VirusTotal submission report with a detection ratio of 1/63
Fake WinSCP site used to distribute malware

th3_protoCOL, to random

themed around the gaming app "parsec"

Initial fake site: parsecus[.]net

Malware downloaded from: parsecworks[.]com

Digitally signed malware "parsec-windows.exe"

Both the distribution site and download url are hosted on 93.190.143.252

Google displaying malware ads above the true website for parsec
Screenshot of virus total, 3/63 vendors are detecting the file
Malware with a digital signature from SSL.com, signed 2 days prior on the 19th

cybersecboardrm, to Cybersecurity
jeromesegura, to random

Unknown stealer distributed via

C2: webvideoshareonline[.]com/bitrix/main.php

Sandbox with PCAP:
https://tria.ge/231219-3ne2xahbar/behavioral1

cc @da_667

avoidthehack, to wordpress

hosting service Kinsta targeted by phishing ads

Threat actors using Google Ads to lure people to fake Kinsta pages in an effort to steal hosting credentials. Be careful of where you click, even on "trusted" pages like Google search results.

Generally, it's best to avoid clicking on sites in the sponsored results of Google (or any search engine, really).

Using an adblocker prevents this section from loading in most cases.

https://www.bleepingcomputer.com/news/security/wordpress-hosting-service-kinsta-targeted-by-google-phishing-ads/

funes, to infosec

A couple weeks back we noticed an uptick of incidents from trojanized Advanced IP Installer's delivered due to . We tied it back to a group who were formerly a affiliate according to Mandiant.

You may remember articles circulating about Bing's AI providing malvertising links. This is from the same campaign.

https://www.connectwise.com/blog/cybersecurity/former-darkside-ransomware-affiliate-distributing-trojanized-installers-via-malvertising

th3_protoCOL, to random

How can anyone reasonably expect a user to detect google ad abuse without visiting the malicious site?

Here's an example of a malicious google ad spoofing anydesk today.

This one redirects users to https[:]//anyowpdesk[.]com before downloading .msi malware:
https://www.virustotal.com/gui/file/9d85ae9e45556067d0b833144e7d9935936a3a3098fe65fc198409083a3a33a6/relations

Fake AnyDesk website

avoidthehack, to Cybersecurity

Associated Press, ESPN, CBS among top sites serving fake alerts

Malvertising on top news sites.

Connected with threat actor "ScamClub." A large portion of this campaign targets mobile users.

-Insert my spiel about using an adblocker- Ads can be blocked in browsers, on devices, and on networks.

https://www.malwarebytes.com/blog/threat-intelligence/2023/11/associated-press-espn-cbs-among-top-sites-serving-fake-virus-alerts

MisuseCase, to security
@MisuseCase@twit.social avatar

Hey @leo glad to hear in the latest episode of :steve: (Episode 949) that is not just a way of reducing annoyance but also a feature because of the proliferation of .

I say all the time on here that using an is a way of protecting yourself because ad delivery platforms are a huge vector for malware and . This would be largely fixable if the owners of these platforms cared, but they don’t.

gpshead, to random

Every time I see anyone complain about YouTube or any other media site blocking Adblock users, I see entitled people who refuse to compensate their content creators and hosting providers. I wonder how many of you bother to fund your mastodon fediverse instances.

I often use an adblocker. I get it. I respect anyone who denies to serve me as a result. This is working as intended.

Netflix revenue and subscriber numbers went up after they got real about account sharing anti-freeloader enforcement. Clearly a lot of people admitted that value existed and they had been freeloaders just because they could.

cxiao,

@gpshead @brettcannon I have a hard time sympathizing with this, because adblocking is also a security feature. Online ads remain one of the most prevalent delivery vectors for malware. Often this takes the form of advertisement for software -> download site purportedly serving installer for said software -> installer executes malicious code.

For this reason, a lot of corporate IT environments push out adblock extensions to browser installations on endpoint machines, or do DNS-based blocking. Therefore, using an adblocker often isn't even the choice of the end user; it's something that's mandated by their IT department on their work computer.

CISA and NSA both have public advisories highlighting this issue, and recommending that organizations deploy adblockers. Note that in their advisories, they explicitly mention the ability of malicious actors to target advertisements towards specific groups of users or demographics when purchasing ads; this is of course a feature baked in to how modern online advertisements work.

See also: the hashtag here.

https://www.cisa.gov/sites/default/files/publications/Capacity_Enhancement_Guide-Securing_Web_Browsers_and_Defending_Against_Malvertising_for_Federal_Agencies.pdf

https://www.nsa.gov/portals/75/documents/what-we-do/cybersecurity/professional-resources/csi-blocking-unnecessary-advertising-web-content.pdf?v=1

ben, to Youtube
@ben@mastodon.bentasker.co.uk avatar

Cheeky fuckers.

#Youtube have deployed Javascript that delays video load if the user is using #Firefox

https://old.reddit.com/r/youtube/comments/17z8hsz/youtube_has_started_to_artificially_slow_down/

kkarhan,

@ben @mozilla @EU_Commission @BNetzA @antidiskriminierung

PS: Yes, #AdBlockers are an accessibility and #ITsec necessity since #malvertising exists and #YouTube too has so much #MaliciousAdvertising that it's clear that #Google never vetted or enforced any rules towards advertisers but only against #creators.

See #AdPocalypse...

r000t, to random
@r000t@fosstodon.org avatar

The Associated Press just served me an ad for fake anti-virus. The entire page was taken over, and forwarded to the malicious site, within seconds of opening the news article, every time.

An ad blocker isn't just something to hide some annoying eyesores, it's a vital layer of security.

If you have friends or family who might fall for fake AV or "windows technical the department" scams, they need an ad blocker. No site they visit can be considered "safe" unless it simply doesn't have ads.

video/mp4

kkarhan,
techygeek, to Cybersecurity
ai6yr, to Cybersecurity
@ai6yr@m.ai6yr.org avatar
FrohlichMarcel, (edited )
@FrohlichMarcel@mathstodon.xyz avatar

@ai6yr @FroehlichMarcel
„Adversaries can even create carefully tailored ads as part of a targeted campaign against a specific victim.“

jeromesegura, to random

The KeePass is back on (from the same advertiser as previously).

New domain: keeqass[.]com
New malware C2: 11234jkhfkujhs[.]xyz

cc @dangoodin

image/png
image/png

jbzfn, to infosec
@jbzfn@mastodon.social avatar

🔎 Google-hosted malvertising leads to fake Keepass site that looks genuine
➥Ars Technica

「 There’s no surefire way to detect either malicious Google ads or punycode-encoded URLs. Posting ķeepass[.]info into all five major browsers leads to the imposter site. When in doubt, people can open a new browser tab and manually type the URL, but that’s not always feasible when they’re long 」

https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/

jeromesegura, to random

There is a live Google search campaign targeting users. The malicious domain name uses Punycode to trick victims.

https://www.malwarebytes.com/blog/threat-intelligence/2023/10/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website

image/png

MisuseCase, to microsoft
@MisuseCase@twit.social avatar

Predictably, started injecting ads into powered conversations…and just as predictably, there is now a huge problem in Bing Chat.

It’s actually worse than poisoned advertisements showing up in search engine results for a couple of reasons.

https://www.malwarebytes.com/blog/threat-intelligence/2023/09/malicious-ad-served-inside-bing-ai-chatbot

/1

securityaffairs, to macos Italian
jeromesegura, to random

Google search for "Cisco Anyconnect" pushes

Fake site:
https://sawebso[.]com/anyconnect/cisco/?gclid=

Payload: https://dayvisson[.]com/Cisco-Mobility-Client-v4[.]iso

https://www.virustotal.com/gui/file/503156f1b27d4dd463048f85924a2bbbeb3d0e09de2574395a51f77b48e9639d?nocache=1

malwareinfosec, to random

Recently I spent about a week focusing on popular Google search terms and discovered that brand impersonation via malicious ads is still very much a problem.

I've documented my findings and some suggestions in this blog post: https://www.malwarebytes.com/blog/threat-intelligence/2023/05/malvertising-its-a-jungle-out-there

A malicious ad for Amazon via a Google search
A malicious ad for Amazon via a Google search
A malicious ad for Amazon via a Google search

malwareinfosec, to random

pushing fake WinSCP installer.

wincspone[.]com
wincsp[.]pro

Payload is Redline Stealer with C2: 95.217.39.93:32312 via embedded PowerShell

https://www.virustotal.com/gui/file/847445db14dc0c691db65fc9cb7a7ecd8bbdeb5ab800625b1d881bcf3e505362?nocache=1

mithrandir, to random

More related to AnyDesk found today.

IOCs:
https://airplexacrepair[.]com
https://anydeesk[.]net
https://www.yb-lawyers[.]com/wp-content/ter/anyconnect/AnyDesk.iso

Drops an ISO with a 64-bit DLL I'm currently playing with.

https://www.virustotal.com/gui/file/62b1e355a7e4c850bb0f03c7f182f48f0ebaafa07ddae1fee599a78772d149f2/behavior

image/png
image/png

drahardja, to ai
@drahardja@sfba.social avatar

New SEO just dropped yo

“Google's new AI search results promotes sites pushing malware, scams”

https://www.bleepingcomputer.com/news/google/googles-new-ai-search-results-promotes-sites-pushing-malware-scams/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • khanakhh
  • mdbf
  • ethstaker
  • magazineikmin
  • GTA5RPClips
  • rosin
  • thenastyranch
  • Youngstown
  • InstantRegret
  • slotface
  • osvaldo12
  • kavyap
  • DreamBathrooms
  • JUstTest
  • Durango
  • everett
  • cisconetworking
  • normalnudes
  • tester
  • ngwrru68w68
  • cubers
  • modclub
  • tacticalgear
  • provamag3
  • Leos
  • anitta
  • lostlight
  • All magazines