{"id":17848,"date":"2020-02-28T11:10:03","date_gmt":"2020-02-28T19:10:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/28\/news-11581\/"},"modified":"2020-02-28T11:10:03","modified_gmt":"2020-02-28T19:10:03","slug":"news-11581","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/28\/news-11581\/","title":{"rendered":"Domen toolkit gets back to work with new malvertising campaign"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Fri, 28 Feb 2020 17:54:18 +0000<\/strong><\/p>\n<p>Last year, we <a rel=\"noreferrer noopener\" aria-label=\"documented (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/\" target=\"_blank\">documented<\/a> a new social engineering toolkit we called &#8220;Domen&#8221; being used in the wild. Threat actors were using this kit to trick visitors into visiting compromised websites and installing malware under the guise of a browser update or missing font.<\/p>\n<p>Despite being a robust toolkit, we only saw Domen in sporadic campaigns last year, often reusing the same infrastructure that had already been partially disrupted. However, we recently came across a new <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/06\/truth-in-malvertising-how-to-beat-bad-ads\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"malvertising campaign (opens in a new tab)\">malvertising campaign<\/a> with brand new infrastructure that shows Domen is still being used by threat actors.<\/p>\n<p>Even though Domen shares similarities with other social engineering templates, it is unique in its own ways. The client-side JavaScript responsible for the fake updates is one of the most thorough and professional coding jobs we had ever seen.<\/p>\n<p>Previously, we had observed Domen pushing the <a rel=\"noreferrer noopener\" aria-label=\"NetSupport RAT (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/social-engineering\/2019\/09\/new-social-engineering-toolkit-draws-inspiration-from-previous-web-campaigns\/\" target=\"_blank\">NetSupport RAT<\/a> and <a rel=\"noreferrer noopener\" aria-label=\"Predator the thief (opens in a new tab)\" href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1199852167730851840?s=20\" target=\"_blank\">Predator the thief<\/a> using its own custom downloader. This time, we noticed a change where the threat actor seems to be experimenting with <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/01\/fake-spectre-and-meltdown-patch-pushes-smoke-loader\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Smoke Loader (opens in a new tab)\">Smoke Loader<\/a>, followed by several different payloads.<\/p>\n<h3>Domen: the origins<\/h3>\n<p>We published our original blog in September 2019, however Domen had been active for several months already. We confirmed this when we found an advertisement posted in a blackhat forum in April 2019 that promoted the toolkit as a way to install EXEs and APKs.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42510\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/forumpost\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost.png\" data-orig-size=\"681,682\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"forumpost\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost-300x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost-600x600.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost.png\" alt=\"\" class=\"wp-image-42510\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost.png 681w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost-300x300.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost-600x600.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/forumpost-150x150.png 150w\" sizes=\"(max-width: 681px) 100vw, 681px\" \/><\/figure>\n<p>A couple months after our blog, we observed Domen in another campaign\u2014probably carried out by the same threat actor. However, unlike the former one that had been used on compromised websites, this time it was via a malvertising chain (celeritascdn[.]com) leading to a decoy adult site hosted at tendermeets[.]club (a copycat of ftvgirls[.]com).<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42476\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/tendermeets\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets.png\" data-orig-size=\"792,672\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"tendermeets\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets-300x255.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets-600x509.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets.png\" alt=\"\" class=\"wp-image-42476\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets.png 792w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets-300x255.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeets-600x509.png 600w\" sizes=\"(max-width: 792px) 100vw, 792px\" \/><\/figure>\n<p>The reason we believe the two campaigns are related is because the delivery vector for the payload uses the same technique, namely uploading malicious files to Bitbucket.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42477\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/tendermeetstraffic\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic.png\" data-orig-size=\"756,247\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"tendermeetstraffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic-300x98.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic-600x196.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic.png\" alt=\"\" class=\"wp-image-42477\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic.png 756w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic-300x98.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/tendermeetstraffic-600x196.png 600w\" sizes=\"(max-width: 756px) 100vw, 756px\" \/><\/figure>\n<p>Between the end of November 2019 and most of February 2020, Domen fell fairly silent. <\/p>\n<h3>Latest Domen campaign<\/h3>\n<p>On February 19, we caught a new malvertising chain with new domains, this time using a VPN service as a lure.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42478\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/vpntemplate\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate.png\" data-orig-size=\"955,657\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"vpntemplate\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate-300x206.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate-600x413.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate.png\" alt=\"\" class=\"wp-image-42478\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate.png 955w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate-300x206.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/vpntemplate-600x413.png 600w\" sizes=\"(max-width: 955px) 100vw, 955px\" \/><\/figure>\n<p>The threat actor had just created new infrastructure to host the fraudulent page (search-one[.]info), the download site (mix-world[.]best), and the backend panel (panel-admin[.]best).<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42479\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/searchonetraffic\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic.png\" data-orig-size=\"653,323\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"searchonetraffic\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic-300x148.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic-600x297.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic.png\" alt=\"\" class=\"wp-image-42479\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic.png 653w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic-300x148.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/searchonetraffic-600x297.png 600w\" sizes=\"(max-width: 653px) 100vw, 653px\" \/><\/figure>\n<p>The payload is this infection chain is Smoke Loader. In one instance, Smoke Loader distributed several secondary payloads, including the IntelRapid cryptominer, a Vidar stealer, and <a href=\"https:\/\/www.zdnet.com\/article\/vegalocker-evolves-into-buran-ransomware-as-a-service\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Buran ransomware (opens in a new tab)\">Buran ransomware<\/a>.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42508\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/diagram-8\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram.png\" data-orig-size=\"810,618\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"diagram\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram-300x229.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram-600x458.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram.png\" alt=\"\" class=\"wp-image-42508\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram.png 810w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram-300x229.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/diagram-600x458.png 600w\" sizes=\"(max-width: 810px) 100vw, 810px\" \/><\/figure>\n<p>This is an interesting payload combination that seems to be more <a rel=\"noreferrer noopener\" aria-label=\"common (opens in a new tab)\" href=\"https:\/\/www.cybereason.com\/blog\/the-hole-in-the-bucket-attackers-abuse-bitbucket-to-deliver-an-arsenal-of-malware\" target=\"_blank\">common<\/a> these days.<\/p>\n<h3>More social engineering schemes<\/h3>\n<p>Domen is a well-made toolkit that has been used to distribute a variety of payloads by using tried and tested <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/social-engineering-cybercrime\/2018\/08\/social-engineering-attacks-what-makes-you-susceptible\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"social engineering tricks (opens in a new tab)\">social engineering tricks<\/a>. While tracking its author (or distributor), we noticed other forum postings advertising the same sort of payload installs, but using different and creative themes.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" data-attachment-id=\"42509\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/attachment\/templates-2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates.png\" data-orig-size=\"942,727\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"templates\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates-300x232.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates-600x463.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates.png\" alt=\"\" class=\"wp-image-42509\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates.png 942w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates-300x232.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/templates-600x463.png 600w\" sizes=\"(max-width: 942px) 100vw, 942px\" \/><\/figure>\n<p>The concept is the same, namely, those bogus sites are tempting users to download software that happens to be malware.<\/p>\n<p>Since the decline in browser exploits in recent years, threat actors have migrated toward other infection vectors. As far as web threats are concerned, social engineering remains highly effective.<\/p>\n<p><a rel=\"noreferrer noopener\" aria-label=\"Malwarebytes business (opens in a new tab)\" href=\"http:\/\/www.malwarebytes.com\/business\" target=\"_blank\">Malwarebytes business<\/a> and <a rel=\"noreferrer noopener\" aria-label=\"Premium consumer users (opens in a new tab)\" href=\"http:\/\/www.malwarebytes.com\/premium\" target=\"_blank\">Malwarebytes for Windows Premium users<\/a> are already protected against this distribution campaign and its accompanying payloads.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p><strong>Domen toolkit<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">search-one[.]info<br \/>panel-admin[.]best<br \/>mix-world[.]best<\/pre>\n<p><strong>Smoke Loader<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">1a91b2a3a252554842de875c89f6eee105bc419d7e32d3a5c9f0f9078780ab30<br \/>vuterfaste[.]ru<\/pre>\n<p><strong>IntelRapid<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">46.166.129[.]235\/forum\/files\/client.exe<br \/>33d5f80242b4006ce14bba56692e1936157e0216b93faac823c42cc3f9ab4ec1<\/pre>\n<p><strong>Vidar<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">46.166.129[.]235\/forum\/files\/mass.exe<br \/>76ce130d2447f71bea8ed902959fd7e0aeac86b55f9e44a327c1f1c1bd73ba3f<br \/>molothunsen[.]com<\/pre>\n<p><strong>Buran\/Zeppelin<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">semantrus.pw\/upload\/open.exe<br \/>0163bb148d4eb632d00d6d3080e07bba46f2f3549e8f95a8ca8951c10280694f<\/pre>\n<p><strong>Vidar<\/strong><\/p>\n<pre class=\"wp-block-preformatted\">cq08462.tmweb[.]ru\/88.exe<br \/>628a9c97a55155f60d3b5ae29bc64f1dca5a6baf2b4f6a1a1de5e836cd4fb73f<br \/>desperate[.]website<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/\">Domen toolkit gets back to work with new malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Fri, 28 Feb 2020 17:54:18 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/' title='Domen toolkit gets back to work with new malvertising campaign'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/shutterstock_325208969.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We describe the latest malvertising campaign that uses Domen, an advanced social engineering toolkit.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/buren-ransomware\/\" rel=\"tag\">buren ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/domen\/\" rel=\"tag\">Domen<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/domen-toolkit\/\" rel=\"tag\">domen toolkit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/intelrapid-cryptominer\/\" rel=\"tag\">intelrapid cryptominer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/javascript\/\" rel=\"tag\">JavaScript<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malicious-websites\/\" rel=\"tag\">malicious websites<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising\/\" rel=\"tag\">malvertising<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malvertising-campaigns\/\" rel=\"tag\">malvertising campaigns<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smoke-loader\/\" rel=\"tag\">smoke loader<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/toolkit\/\" rel=\"tag\">toolkit<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vidar\/\" rel=\"tag\">Vidar<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/vidar-stealer\/\" rel=\"tag\">vidar stealer<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/' title='Domen toolkit gets back to work with new malvertising campaign'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/02\/domen-toolkit-gets-back-to-work-with-new-malvertising-campaign\/\">Domen toolkit gets back to work with new malvertising campaign<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24349,22814,24350,24351,10871,22518,10531,23986,16768,10510,10494,24352,20584,24353],"class_list":["post-17848","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-buren-ransomware","tag-domen","tag-domen-toolkit","tag-intelrapid-cryptominer","tag-javascript","tag-malicious-websites","tag-malvertising","tag-malvertising-campaigns","tag-smoke-loader","tag-social-engineering","tag-threat-analysis","tag-toolkit","tag-vidar","tag-vidar-stealer"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17848"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17848\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17848"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}