HomeCyber BalkansHackers Utilize Google Search Ads to Distribute Malware Concealed in MSI Files

Hackers Utilize Google Search Ads to Distribute Malware Concealed in MSI Files

Published on

spot_img

Hackers have recently been exploiting Google search ads to distribute malware through MSI (Microsoft Installer) packages, as reported by ThreatDown. This nefarious campaign involves the use of FakeBat, a malware loader that targets unsuspecting users by posing as legitimate software downloads.

The attack commences with a Google search ad that appears to be legitimate, using the actual website address of popular software like Notion. However, this ad is a facade purchased by threat actors who have been consistently linked to identities in Kazakhstan. Clicking on the ad redirects users to a phishing site hosted at a deceptive URL that closely resembles the genuine site.

On this deceptive website, users are prompted to download what seems to be a standard software installer in MSIX format, purportedly signed under the reputable name “Forth View Designs Ltd.” Upon executing the MSIX installer, a hidden malicious PowerShell script is activated, connecting to the command and control server (C2) of FakeBat. This connection initiates the download of a secondary payload known as zgRAT.

The PowerShell script is designed to bypass local security measures and inject the zgRAT malware directly into system processes, effectively taking control of the infected machine. The campaign utilizes a click tracker service to manage the ad’s effectiveness and filter out unwanted traffic, enhancing the stealth of the attack.

ThreatDown, a cybersecurity firm, blocked the C2 server used in this campaign and recorded the attack’s progression from the initial MSIX execution to the final payload deployment. They recommend the use of Endpoint Detection and Response (EDR) systems to monitor and block such malicious activities. Organizations are advised to restrict or control the use of MSIX files through group policies and distribute software installers via an internal company repository to mitigate the risks associated with malicious ads.

This incident underscores the ongoing risks associated with malvertising and the sophistication of modern cyber threats. Users and organizations are urged to remain vigilant and employ advanced security measures to safeguard against these deceptive and damaging attacks. The use of malicious ads to distribute malware serves as a stark reminder of the importance of implementing robust cybersecurity measures to protect against evolving cyber threats.

In conclusion, the exploitation of Google search ads to distribute malware highlights the need for continued vigilance and proactive cybersecurity measures in the face of increasingly sophisticated cyber attacks. Organizations must prioritize security protocols to safeguard their systems and data from malicious actors seeking to exploit vulnerabilities for malicious purposes. By staying informed and adopting best practices in cybersecurity, individuals and businesses can better protect themselves against the ever-present threat of cybercrime.

Source link

Latest articles

The Intriguing Situation Surrounding Sean Plankey’s Derailed CISA Nomination

Unraveling the Controversy Surrounding Sean Plankey at the Coast Guard Headquarters In recent developments that...

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms, and 25 New Stories

Unresolved Cybersecurity Threats Persist in the Digital Landscape The landscape of cybersecurity remains fraught with...

Outlook Mailboxes Misused to Hide Linux GoGra Backdoor Traffic

The Harvester APT group has made significant strides in enhancing its spying capabilities by...

More like this

The Intriguing Situation Surrounding Sean Plankey’s Derailed CISA Nomination

Unraveling the Controversy Surrounding Sean Plankey at the Coast Guard Headquarters In recent developments that...

ThreatsDay Bulletin: $290M DeFi Hack, macOS LotL Abuse, ProxySmart SIM Farms, and 25 New Stories

Unresolved Cybersecurity Threats Persist in the Digital Landscape The landscape of cybersecurity remains fraught with...

Outlook Mailboxes Misused to Hide Linux GoGra Backdoor Traffic

The Harvester APT group has made significant strides in enhancing its spying capabilities by...