{"id":22318,"date":"2023-06-26T16:11:08","date_gmt":"2023-06-27T00:11:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/06\/26\/news-16048\/"},"modified":"2023-06-26T16:11:08","modified_gmt":"2023-06-27T00:11:08","slug":"news-16048","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/06\/26\/news-16048\/","title":{"rendered":"Malvertising: A stealthy precursor to infostealers and ransomware attacks"},"content":{"rendered":"<p><em>This article is based on research by <a href=\"https:\/\/www.malwarebytes.com\/blog\/authors\/jeromesegura\">J&eacute;r&ocirc;me Segura<\/a>, Senior Director of Threat Intelligence at Malwarebytes,&nbsp;who&nbsp;oversees data collection from spam feeds and telemetry to identify the most relevant threats.<\/em><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/malvertising\">Malvertising<\/a>, the practice of using online ads to spread malware, can have dire consequences&mdash;and the problem only seems to be growing.<\/p>\n<p><a href=\"https:\/\/try.malwarebytes.com\/business-threat-intel-hub\/\">New research from the <\/a><a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\">Malwarebytes Threat Intelligence<\/a>&nbsp;team shows over 800&nbsp;malvertising-related attacks in 2023 so far alone, an average of almost 5 attacks per day. But even these are only the ones reported by security researchers&mdash;in reality the number is much higher.<\/p>\n<p>Our research indicates that malvertising ads often deliver <a href=\"https:\/\/www.malwarebytes.com\/blog\/threats\/info-stealers\">infostealer<\/a> malware such as IcedID, Aurora Stealer, and&nbsp;BATLOADER among others. These programs steal credentials from users&rsquo; browsers or computers,&nbsp;sowing the seeds for a future ransomware attack.&nbsp;<img decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file7485_270834_e.png\" alt=\"\" \/><\/p>\n<p style=\"text-align: center;\">Malvertising attack count throughout 2023<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/10\/what-is-ransomware-as-a-service-and-how-is-it-evolving\">Ransomware gangs&nbsp;<\/a>often buy stolen credentials from other cyber criminals involved in the&nbsp;dirty work of initial access brokering. In the case of malvertising, the chain of events looks something like this:<\/p>\n<ol>\n<li><strong>Malvertising campaigns infect users with infostealers.<\/strong><\/li>\n<li><strong>Infostealers harvest user credentials.<\/strong><\/li>\n<li><strong>Stolen credentials are sold in underground forums.<\/strong><\/li>\n<li><strong>Ransomware actors buy these credentials to infiltrate networks.<\/strong><\/li>\n<\/ol>\n<p>Alternatively, some ransomware gangs&nbsp;have been observed use malvertising&nbsp;themselves to launch an attack on a victim machine directly.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/5-facts-to-know-about-the-royal-ransomware-gang\">The Royal ransomware group<\/a>, for example,&nbsp;used&nbsp;malvertising to&nbsp;disguise&nbsp;BATLOADER as legitimate installers for applications&nbsp;like&nbsp;TeamViewer. BATLOADER then&nbsp;drops a Cobalt Strike Beacon as a precursor to the ransomware execution.&nbsp;<\/p>\n<p>For organizations looking to&nbsp;nip the malvertising-ransomware connection in the bud, however, perhaps the biggest challenge is how&nbsp;hard malvertising&nbsp;can be&nbsp;to spot.&nbsp;Threat actors often&nbsp;impersonate the official brand name and website in the ad snippet, making attacks extremely&nbsp;deceptive for the average user.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file75932_270834_e.png\" alt=\"\" width=\"1574\" height=\"866\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/>Can you spot the typo in this malvertising attempt?&nbsp;<\/p>\n<p>Even experts at Google have struggled to identify malicious redirects from an ad, underscoring the fact that malvertising is a nuanced, technical problem that requires advanced tools to spot.<\/p>\n<p>In other words, your defense strategy against malvertising shouldn&#8217;t hinge entirely on your team recognizing brand impersonation.&nbsp;Instead, focus on equipping your team with advanced security tools to do the heavy lifting.<\/p>\n<p>Some of the&nbsp;main tools you can use to prevent malvertising include:<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/09\/vulnerability-response-for-smbs-the-malwarebytes-approach\">Vulnerability and patch management software<\/a>:<\/strong> Malvertising often exploits known vulnerabilities in systems, applications, or browsers. These tools can help ensure&nbsp;that web browsers (including plug-ins) are up-to-date with the latest security patches.<\/li>\n<li><strong><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/04\/port-scan-attacks-protecting-your-business-from-rdp-attacks-and-mirai-botnetshttps:\/\/www.malwarebytes.com\/business\/edr\">Web protection applications<\/a>:<\/strong> Since malvertising campaigns often rely on connecting to malicious servers to download additional malware or steal information, blocking these connections can stop the attack in its tracks.<\/li>\n<li><strong>Ad blockers:<\/strong> These can filter out potential malvertising threats and prevent hazardous content from loading. <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">Malwarebytes Browser Guard<\/a>&nbsp;provides additional protection to standard ad-blocking features by covering a larger area of the attack chain all the way to domains controlled by attackers.<\/li>\n<\/ul>\n<p>Download&nbsp;the Malwarebytes Threat Intelligence Threat Brief today for comprehensive insights on malvertising and its role in&nbsp;stealing&nbsp;credentials.<\/p>\n<p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"color: #ffffff;\"><a href=\"https:\/\/try.malwarebytes.com\/business-threat-intel-hub\/\" style=\"color: #ffffff;\">Download&nbsp;Now<\/a><\/span><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/malvertising-a-stealthy-precursor-to-infostealers-and-ransomware-attacks\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/business\" rel=\"category tag\">Business<\/a><\/p>\n<p>Malvertising, the practice of using online ads to spread malware, can have dire consequences\u2014and the problem only seems to be growing.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/malvertising-a-stealthy-precursor-to-infostealers-and-ransomware-attacks\" title=\"Malvertising: A stealthy precursor to infostealers and ransomware attacks \">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/malvertising-a-stealthy-precursor-to-infostealers-and-ransomware-attacks\">Malvertising: A stealthy precursor to infostealers and ransomware attacks <\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-22318","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22318"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22318\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22318"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}