{"id":22659,"date":"2023-08-08T16:10:22","date_gmt":"2023-08-09T00:10:22","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/08\/08\/news-16389\/"},"modified":"2023-08-08T16:10:22","modified_gmt":"2023-08-09T00:10:22","slug":"news-16389","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/08\/08\/news-16389\/","title":{"rendered":"Digital assets continue to be prime target for malvertisers"},"content":{"rendered":"<p>Cyber-criminals continue to impersonate brands via well-crafted phishing websites. We previously&nbsp;covered attacks on both <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/05\/malvertising-its-a-jungle-out-there\" target=\"_blank\">consumers<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/07\/criminals-target-businesses-with-malicious-extension-for-metas-ads-manager-and-accidentally-leak-stolen-accounts\" target=\"_blank\">businesses<\/a> via online searches for popular brands leading to scams or malware.<\/p>\n<p>Digital assets such as cryptocurrencies or NFTs are highly coveted by threat actors due to the high gains that can be made, even via a simple phishing attack.<\/p>\n<p>In this blog post, we&nbsp;investigate&nbsp;a malicious ad on Microsoft Bing for LooksRare, an NFT marketplace. Malvertising is helping scammers to phish users with added credibility but also leaves victims irate about ads and top search engines.<\/p>\n<\/p>\n<h2>Malicious ads for NFT marketplace<\/h2>\n<p>Non-fungible tokens (NFTs) are assets that have been tokenized via a blockchain. Whether you are into them or find them <a href=\"https:\/\/youtu.be\/0OK80eljWrs?t=642\" target=\"_blank\">laughable<\/a>, a lot of money is being invested, making them attractive to criminals. In a <a href=\"https:\/\/twitter.com\/robbyhammz\/status\/1687652852414418944?s=20\" target=\"_blank\">post<\/a> on social media, one user claimed to have lost $300K worth of NFTs because they clicked on a Google ad:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file46353_275928_e.png\" alt=\"Original post\" width=\"591\" height=\"540\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>We could not immediately find the same ad on Google, but we did see one on Microsoft Bing that is likely tied to the same campaign:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file75855_275928_e.png\" alt=\"Bing search for looksrare\" width=\"823\" height=\"403\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The &#8220;why you&#8217;re seeing this ad?&#8221;&nbsp;dialog shows the advertiser as being from China and the ad by a company named Fantacy Click Limited:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file79847_275928_e.png\" alt=\"Ad details\" width=\"636\" height=\"547\" caption=\"false\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Microsoft&#8217;s <a href=\"https:\/\/help.ads.microsoft.com\/#apex\/ads\/en\/60151\/-1\" target=\"_blank\">Advertiser Identity Verification Program<\/a> states that when ads don&#8217;t pass&nbsp;policy checks,&nbsp;they either stop serving the ads or suspend the advertiser&#8217;s account. In this example of brand impersonation, the&nbsp;phishing domain (looksrare-org[.]com) was freshly registered on August 7th 2023. While we can&#8217;t expect companies to track every possible brand out there, a simple domain registration check could easily reveal risky advertisers.<\/p>\n<h2>Decoy redirect<\/h2>\n<p>The threat actor invested minim efforts to deceive crawlers and other automation tools by setting up the usual cloaking page. In this example, you get redirected to an &#8220;about us&#8221; decoy page:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file25720_275928_e.png\" alt=\"Decoy traffic\" width=\"567\" height=\"112\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Unfortunately, while it is easy for humans to see that this&nbsp;site is completely fake, machines will find no security issue and validate it:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file98452_275928_e.png\" alt=\"\" width=\"652\" height=\"813\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Redirect and phishing page<\/h2>\n<p>Legitimate users and intended victims clicking on the ad will get a different experience. They are redirected to a second website (www-market-lookshare[.]com) that was also registered very recently and that acts as the phishing site:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file36264_275928_e.png\" alt=\"Web traffic\" width=\"761\" height=\"137\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>This site is a close replica of the official looksrare[.]org domain:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file91453_275928_e.png\" alt=\"Comparing the phishing page with the real site\" width=\"1111\" height=\"832\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<h2>Draining wallets<\/h2>\n<p>The phishing site invites victims to connect their wallet by scanning a QR code:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file84498_275928_e.png\" alt=\"QR code on phishing site\" width=\"914\" height=\"815\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>If you are running the Coinbase extension, you will get a request such as the one below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/easset_upload_file98054_275928_e.png\" alt=\"Coinbase request\" width=\"355\" height=\"608\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>After connecting to the victim&#8217;s wallet, the threat actor will run a few queries and eventually prompt the&nbsp;user to sign a message, granting them access to their NFTs. Someone has analyzed the transactions associated with this campaign in a thread <a href=\"https:\/\/twitter.com\/0xBreadguy\/status\/1688337984666353664?s=20\" target=\"_blank\">here<\/a>.<\/p>\n<h2>Phishing and&nbsp;crypto assets<\/h2>\n<p>Many people have expressed concerns about cryptocurrencies and other digital assets due to how many scams there are, but also because of how easy it can be to lose very large sums of money&nbsp;with just a few wrong clicks.<\/p>\n<p>Phishing sites&nbsp;can be very convincing especially if the user visited them via a paid Google or Bing search ad that&nbsp;they expect has already been verified as legitimate.<\/p>\n<p>There are a number of tools that can help to protect your wallets and gain&nbsp;better visibility over incoming transactions. Malwarebytes <a href=\"https:\/\/www.malwarebytes.com\/browserguard\" target=\"_blank\">Browser Guard<\/a> can block those phishing websites and malicious ads to keep you out of harm&#8217;s way.<\/p>\n<p>We have reported this malicious ad to Microsoft via their low quality ad submission &amp; escalation <a href=\"https:\/\/about.ads.microsoft.com\/en-us\/resources\/policies\/report-spam-form\" target=\"_blank\">form<\/a>. An automated response informed us that Microsoft will review and take action on any ads found to be in violation within 3-5 days. Unfortunately, this gives criminals enough time to run their malvertising campaigns uninterrupted and switch accounts by the time they are caught.<\/p>\n<h2>Indicators of compromise<\/h2>\n<pre>looksrare-org[.]info<br \/>looksrare-org[.]com<br \/>www-market-looksrare[.]com<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/digital-assets-continue-to-be-prime-target-for-malvertisers\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: malvertising<\/p>\n<p>Tags: nft<\/p>\n<p>Tags: crypto<\/p>\n<p>Tags: wallet<\/p>\n<p>Tags: bing<\/p>\n<p>Tags: google<\/p>\n<p>NFT enthusiasts are getting their wallets drained after clicking on a malicious ad.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/digital-assets-continue-to-be-prime-target-for-malvertisers\" title=\"Digital assets continue to be prime target for malvertisers\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/08\/digital-assets-continue-to-be-prime-target-for-malvertisers\">Digital assets continue to be prime target for malvertisers<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[13776,10537,1670,10531,24758,12040,14646],"class_list":["post-22659","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bing","tag-crypto","tag-google","tag-malvertising","tag-nft","tag-threat-intelligence","tag-wallet"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22659","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22659"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22659\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22659"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22659"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22659"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}