Jérôme Segura

16 Followers
94 Following
199 Posts
Threat intel and web threats

Malvertisers rickrolling security researchers...

softwareinteractivo[.]com
winsccp[.]com
protemaq[.]com/wp-content/update/iso/6[.]1/tusto/WinSCP-6[.]1-Setup[.]iso

https://www.virustotal.com/gui/file/2eb2ef7a562145a0faf3c82f439221908adfcc784022a64e5bb17a432f4a8a91

VirusTotal

VirusTotal

VirusTotal

VirusTotal

Some next level cloaking from this malvertising group.

Payload is RedLine Stealer:
cdn[.]discordapp[.]com/attachments/1067816024541507666/1116463363891933204/AnyDesk.zip

#Malvertising targeting Cisco AnyConnect dropping Python Meterpreter payload.

mypondsoftware[.]com/cisco/anyconnect/file.php
trafcon[.]co/wp-content/plug/des/sus/cisco/anyconnect/cisco-anyconnect-4.iso

C2: 141.98.6[.]95

https://www.virustotal.com/gui/file/9c57a2a27b6fcea5bcf1eda791ccdaa0eb3fdbf93781b37283d956332f4d2ceb?nocache=1

VirusTotal

VirusTotal

Recently I spent about a week focusing on popular Google search terms and discovered that brand impersonation via malicious ads is still very much a problem.

I've documented my findings and some suggestions in this blog post: https://www.malwarebytes.com/blog/threat-intelligence/2023/05/malvertising-its-a-jungle-out-there

#malvertising

Malvertising via brand impersonation is back again

Ads containing the official website of an impersonated brand are running again, allowing fraudsters to scam users.

Malwarebytes

#Malvertising pushing fake WinSCP installer.

wincspone[.]com
wincsp[.]pro

Payload is Redline Stealer with C2: 95.217.39.93:32312 via embedded PowerShell

https://www.virustotal.com/gui/file/847445db14dc0c691db65fc9cb7a7ecd8bbdeb5ab800625b1d881bcf3e505362?nocache=1

VirusTotal

VirusTotal

Another Kritec skimmer targeting a Spanish online store

aifanul[.]yachts
soplelec[.]pics

#Magecart

I wrote a blog about a #malvertising campaign leading to a fake system update page.

In reality, it is the Aurora stealer packaged inside the stealthy Invalid Printer loader.

https://www.malwarebytes.com/blog/threat-intelligence/2023/05/fake-system-update-drops-new-highly-evasive-loader

Fake system update drops Aurora stealer via 'Invalid Printer' loader

Not all system updates mean well, and some will even trick you into installing malware.

Malwarebytes

Template targeting German store from the Kritec skimmer

hapermob[.]shop
xiloditg[.]yachts/mage-cache-loader-v2-4.min.js

#Magecart

Malicious WinSCP installer distributed via Google ad (#malvertising).

Cloaking ad domain: putmastering[.]com

Fake WinSCP site:
winscpn[.]com

C2 callbacks:
104.234.10[.]207:7931/itrdd/kcrs/file1.txt
104.234.10[.]207:7931/itrdd/kcrs/file2.txt

https://www.virustotal.com/gui/file/c118895776e75eaa291d2a5f54f1de4f48756aec28cebaa1bf6fd9beb5d36301/detection

VirusTotal

VirusTotal