• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
new malvertising campaign uses fake windows news portal to distribute

New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers

You are here: Home / General Cyber Security News / New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers
November 9, 2023

A new malvertising marketing campaign has been identified to make use of phony websites that masquerade as legitimate Windows information portal to propagate a destructive installer for a preferred method profiling instrument called CPU-Z.

“This incident is a component of a greater malvertising marketing campaign that targets other utilities like Notepad++, Citrix, and VNC Viewer as observed in its infrastructure (area names) and cloaking templates made use of to prevent detection,” Malwarebytes’ Jérôme Segura said.

Whilst malvertising strategies are acknowledged to set up replica websites promotion widely-employed software program, the most recent activity marks a deviation in that the web page mimics WindowsReport[.]com.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The aim is to trick unsuspecting buyers hunting for CPU-Z on lookup engines like Google by serving malicious adverts that, when clicked, redirect them to the fake portal (workspace-app[.]on-line).

At the exact time, buyers who are not the intended victims of the marketing campaign are served an innocuous website with unique content articles, a approach recognized as cloaking.

Cybersecurity

The signed MSI installer which is hosted on the rogue web-site consists of a malicious PowerShell script, a loader recognized as FakeBat (aka EugenLoader), which serves as a conduit to deploy RedLine Stealer on the compromised host.

“It is possible the menace actor selected to create a decoy internet site on the lookout like Windows Report since many computer software utilities are usually downloaded from these portals as a substitute of their formal web web page,” Segura famous.

This is far from the 1st time deceptive Google Advertisements for well known software program have turned out to be a malware distribution vector. Past week, cybersecurity organization eSentire disclosed facts of an up-to-date Nitrogen marketing campaign that paves the way for a BlackCat ransomware attack.

Malvertising

Two other strategies documented by the Canadian cybersecurity firm display that the drive-by down load method of directing buyers to doubtful web-sites has been leveraged to propagate numerous malware family members like NetWire RAT, DarkGate, and DanaBot in latest months.

The advancement comes as danger actors proceed to increasingly depend on adversary-in-the-center (AiTM) phishing kits this sort of as NakedPages, Strox, and DadSec to bypass multi-factor authentication and hijack specific accounts.

Cybersecurity

To prime it all, eSentire also termed consideration to a new system dubbed the Wiki-Slack attack, a person-course attack that aims to drive victims to an attacker-managed site by defacing the conclusion of the very first para of a Wikipedia report and sharing it on Slack.

Exclusively, it exploits a quirk in Slack that “mishandle[s] the whitespace in between the initially and 2nd paragraph” to auto-deliver a website link when the Wikipedia URL is rendered as a preview in the company messaging system.

It really is truly worth pointing out that a key prerequisite to pulling off this attack is that the to start with term of the next paragraph in the Wikipedia write-up have to be a best-degree domain (e.g., in, at, com, or net) and that the two paragraphs need to look inside the to start with 100 terms of the post.

With these limitations, a threat could weaponize this actions these kinds of that the way Slack formats the shared page’s preview final results points to a destructive link that, upon clicking, requires the sufferer to a booby-trapped web page.

“If a person does not have ethical guardrails, they can augment the attack surface area of the Wiki-Slack attack by modifying Wikipedia pages of fascination to deface it,” eSentire said.

Discovered this article interesting? Abide by us on Twitter  and LinkedIn to examine more exclusive content material we post.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «when email security meets saas security: uncovering risky auto forwarding rules When Email Security Meets SaaS Security: Uncovering Risky Auto-Forwarding Rules
Next Post: Zero-Day Alert: Lace Tempest Exploits SysAid IT Support Software Vulnerability zero day alert: lace tempest exploits sysaid it support software vulnerability»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.