{"id":20116,"date":"2022-09-15T16:10:05","date_gmt":"2022-09-16T00:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/09\/15\/news-13849\/"},"modified":"2022-09-15T16:10:05","modified_gmt":"2022-09-16T00:10:05","slug":"news-13849","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/09\/15\/news-13849\/","title":{"rendered":"Malvertising on Microsoft Edge&#8217;s News Feed pushes tech support scams"},"content":{"rendered":"<p>While&nbsp;Google Chrome still dominates as the top browser, Microsoft Edge, which is&nbsp;based on the Chromium source code, is gradually gaining more users. Perhaps more importantly, it is the default browser on the Microsoft Windows platform and as such some segments of its user base&nbsp;are of particular interest&nbsp;to fraudsters.<\/p>\n<p>We have tracked and observed a malvertising campaign on the Microsoft Edge News Feed used to redirect victims to tech support scam pages. The scheme is simple and relies on threat actors inserting their advertisements on the Edge home page&nbsp;and trying to lure users with shocking or bizarre stories.<\/p>\n<p>In this blog post, we raise awareness and expose this scam operation that has been going on for at least two months.<\/p>\n<h2>Overview<\/h2>\n<p>The Microsoft Edge News Feed is a collection of thumbnails alternating between news content, traffic updates and advertisements. We have identified several ads that are malicious and redirect unsupecting users to tech support scams.<\/p>\n<p>The redirection flow can be summarized in the diagram below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/easset_upload_file28463_236422_e.png\" alt=\"\" width=\"730\" height=\"753\" \/><\/p>\n<h2>Technical details<\/h2>\n<p>When a user clicks on one of the malicious ads, a request to the Taboola ad network is made via&nbsp;an API (api.taboola.com) to honor the click on the ad banner. The server will respond with the next URL to load, with the folling format:<\/p>\n<pre>document.location.replace('https:\/\/[scammer domain]\/{..}\/?utm_source=taboola&amp;amp;utm_medium=referral<\/pre>\n<p>The first request to one of those malicious domains retrieves a Base64 encoded&nbsp;JavaScript whose goal is to check the current visitor and determine if they are the potential target.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/easset_upload_file33872_236422_e.png\" alt=\"\" width=\"767\" height=\"554\" \/><\/p>\n<p>An original version of this script can be found <a href=\"https:\/\/github.com\/MBThreatIntel\/TSS\/blob\/master\/Taboola\/taboola_campaign_raw.txt\" target=\"_blank\">here<\/a>, while a beautified version can be found <a href=\"https:\/\/github.com\/MBThreatIntel\/TSS\/blob\/master\/Taboola\/taboola_campaign_decoded.txt\" target=\"_blank\">here<\/a>.<\/p>\n<p>The goal of this script is to only show the&nbsp;malicious redirection to potential victims, ignoring bots, VPNs and geolocations that are not of interest that are instead shown a harmless page related to the advert.<\/p>\n<p>This scheme is meant to trick innocent users with fake browser locker pages, very well known and used by tech support scammers. What&#8217;s worth noticing is the cloud infrastructure that is being leveraged here, making it very difficult to block.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/easset_upload_file53027_236422_e.png\" alt=\"\" width=\"802\" height=\"429\" \/><\/p>\n<p>These are subdomains on&nbsp;ondigitalocean.app which are constantly changing; in the span&nbsp;of 24 hours, we collected over 200 different hostnames.<\/p>\n<h2>Infrastructure<\/h2>\n<p>The advertisements displayed on the Edge News Feed are linked with the following domains (this list is not exhaustive):<\/p>\n<ul>\n<li>\n<div>feedsonbudget[.]com<\/div>\n<\/li>\n<li>\n<div>financialtrending[.]com<\/div>\n<\/li>\n<li>\n<div>foddylearn[.]com<\/div>\n<\/li>\n<li>\n<div>glamorousfeeds[.]com<\/div>\n<\/li>\n<li>\n<div>globalnews[.]cloud<\/div>\n<\/li>\n<li>\n<div>hardwarecloseout[.]com<\/div>\n<\/li>\n<li>\n<div>humaantouch[.]com<\/div>\n<\/li>\n<li>\n<div>mainlytrendy[.]com<\/div>\n<\/li>\n<li>\n<div>manbrandsonline[.]com<\/div>\n<\/li>\n<li>\n<div>polussuo[.]com<\/div>\n<\/li>\n<li>\n<div>newsagent[.]quest<\/div>\n<\/li>\n<li>\n<div>newsforward[.]quest<\/div>\n<\/li>\n<li>\n<div>puppyandcats[.]online<\/div>\n<\/li>\n<li>\n<div>thespeedoflite[.]com<\/div>\n<\/li>\n<li>\n<div><span style=\"text-decoration: underline;\"><strong>tissatweb[.]us<\/strong><\/span><\/div>\n<\/li>\n<li>\n<div>trendingonfeed[.]com<\/div>\n<\/li>\n<li>\n<div>viralonspot[.]com<\/div>\n<\/li>\n<li>\n<div>weeklylive[.]info<\/div>\n<\/li>\n<li>\n<div>everyavenuetravel[.]site<\/div>\n<\/li>\n<\/ul>\n<p>One of the domains,tissatweb[.]us, which was also publicly <a href=\"https:\/\/scammer.info\/t\/tech-scam-833-954-1953\/99506\" target=\"_blank\">reported<\/a>&nbsp;for hosting a browser locker has interesting whois data:<\/p>\n<pre>Registrant Email: sumitkalra1683@gmail[.]com<\/pre>\n<p>That email address is associated with the following additional domains:<\/p>\n<div>\n<ul>\n<li>tissat[.]us<\/li>\n<li>mvpconsultant[.]us<\/li>\n<li>aksconsulting[.]us<\/li>\n<li>furnitureshopone[.]us<\/li>\n<li>minielectronic[.]in<\/li>\n<li>antivirusphonenumber[.]org<\/li>\n<li>quickbooktechnicalsupport[.]org<\/li>\n<li>printertechnicahelp[.]com<\/li>\n<li>comsecurityessentials[.]support<\/li>\n<li>decfurnish[.]com<\/li>\n<li>netsecurity-essential[.]com<\/li>\n<li>mamsolutions[.]us<\/li>\n<li>mamsolution[.]us<\/li>\n<li>a-techsolutions[.]us<\/li>\n<\/ul><\/div>\n<p>The&nbsp;email address belongs&nbsp;to an individual named <strong>Sumit Kalra<\/strong>&nbsp;who is listed as a director for <strong>Mws Software Services Private Limited<\/strong>, a company located in Delhi whose principal business activity&nbsp;is &#8220;Computer and related activities&#8221;.<\/p>\n<h2>Protection<\/h2>\n<p>This particular campaign is currently one of the biggest we are seeing in terms of telemetry noise.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/easset_upload_file46261_236422_e.png\" alt=\"\" width=\"499\" height=\"633\" \/><\/p>\n<p>The fingerprinting to avoid detection is interesting and more sophisticated than usual. We will continue to expose and report abusive infrastructure used for scams.<\/p>\n<p>Malwarebytes users were already protected against this tech support scam thanks to our <a href=\"https:\/\/www.malwarebytes.com\/browserguard\" target=\"_blank\">Browser Guard extension<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/microsoft-edges-news-feed-pushes-tech-support-scam\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>We uncovered a campaign on the Microsoft Edge home page where malicious ads are luring victims into tech support scams.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/microsoft-edges-news-feed-pushes-tech-support-scam' title='Malvertising on Microsoft Edge's News Feed pushes tech support scams'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2022\/09\/microsoft-edges-news-feed-pushes-tech-support-scam'>Malvertising on Microsoft Edge&#8217;s News Feed pushes tech support scams<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[],"class_list":["post-20116","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=20116"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/20116\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=20116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=20116"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=20116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}