{"id":23018,"date":"2023-09-28T16:10:12","date_gmt":"2023-09-29T00:10:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/09\/28\/news-16748\/"},"modified":"2023-09-28T16:10:12","modified_gmt":"2023-09-29T00:10:12","slug":"news-16748","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/09\/28\/news-16748\/","title":{"rendered":"Malicious ad served inside Bing&#8217;s AI chatbot"},"content":{"rendered":"<p>In February 2023, Microsoft disclosed its new AI-assisted search engine, Bing Chat, powered by OpenAI&#8217;s GPT-4. Even though Google has been dominating the search industry for years, this event was significant enough to generate not only interest but also&nbsp;plant the seed for a possible change in the balance in the future.<\/p>\n<p>Considering that tech giants make most of their revenue from advertising, it wasn&#8217;t surprising to see Microsoft <a href=\"https:\/\/techcrunch.com\/2023\/03\/29\/that-was-fast-microsoft-slips-ads-into-ai-powered-bing-chat\/\" target=\"_blank\">introduce ads<\/a> into Bing Chat shortly after its release. However, online ads have an inherent risk attached to them. In this blog, we show how users searching for software downloads can be tricked into visiting malicious sites&nbsp;and installing malware directly from a Bing Chat conversation.&nbsp;<\/p>\n<h2>Malvertising via a Bing Chat conversation<\/h2>\n<p>Bing Chat is an interactive text and image application that provides a very different experience for online searches. After six months of it being public, Microsoft <a href=\"https:\/\/blogs.bing.com\/search\/august-2023\/Celebrating-6-months-of-the-new-AI-powered-Bing\" target=\"_blank\">celebrated<\/a>&nbsp;user engagement with over one billion chats.<\/p>\n<p>Ads can be inserted into a Bing Chat conversation in various ways. One of those is when a user hovers over a link and an ad is displayed first before the organic result. In the example below, we asked where we could download a program called Advanced IP Scanner used by&nbsp;network administrators. When we place our cursor over the first sentence, a dialog appears showing an ad and the official website for this program right below it:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file62622_283930_e.png\" alt=\"\" width=\"1708\" height=\"1045\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Users have the choice of visiting either link, although the first one may be more likely to be clicked on because of its position. Even though there is a small &#8216;Ad&#8217; label next to this link, it would be easy to miss and view the link as a regular search result.<\/p>\n<h2>Phishing&nbsp;site serves malware<\/h2>\n<p>Upon clicking the first link, users are taken to a website (<em>mynetfoldersip[.]cfd<\/em>) whose purpose is to filter traffic and separate real victims from bots, sandboxes, or security researchers. It does that by checking your IP address, time zone, and various other system settings such as web rendering that identifies virtual machines.<\/p>\n<p>Real humans are redirected to a fake site (<em>advenced-ip-scanner[.]com<\/em>) that mimics the official one&nbsp;while others are sent to a decoy page. The next step is for victims to download the supposed installer and run it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file40470_283930_e.png\" alt=\"\" width=\"2350\" height=\"1246\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>The MSI installer contains&nbsp;three different files but only one is malicious and is a heavily obfuscated script:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file8823_283930_e.png\" alt=\"\" width=\"1430\" height=\"1154\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>Upon execution, the script reaches out to an external IP address (<em>65.21.119[.]59<\/em>) presumably to announce itself and receive an additional payload.<\/p>\n<h2>Search evolves,&nbsp;malicious ads follow<\/h2>\n<p>Threat actors continue to&nbsp;leverage&nbsp;search ads to redirect users to malicious sites hosting malware. While Bing Chat is a different search experience, it serves some of the same ads seen via a traditional Bing query.<\/p>\n<p>In this case, the malicious actor hacked into the ad account of a legitimate Australian business and created two malicious ads, one targeting&nbsp;network admins (Advanced IP Scanner) and another lawyers (MyCase law manager):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/easset_upload_file64907_283930_e.png\" alt=\"\" width=\"2343\" height=\"1420\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p>With convincing landing pages, victims&nbsp;can easily be tricked into downloading malware and be none the wiser.<\/p>\n<p>We recommend users pay particular attention to the websites they visit but also use a number of security tools to&nbsp;get additional protection. Malwarebytes provides security software for both <a href=\"https:\/\/www.malwarebytes.com\/for-home\" target=\"_blank\">consumers<\/a> and <a href=\"https:\/\/www.malwarebytes.com\/business\/solutions\" target=\"_blank\">businesses<\/a> that includes web protection, ad blocking and malware detection.<\/p>\n<p>This security incident was reported to Microsoft along with a few other related malicious ads.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p>Ad URL and cloaker<\/p>\n<pre>mynetfoldersip[.]cfd<\/pre>\n<p>Fake website<\/p>\n<pre>advenced-ip-scanner[.]com<\/pre>\n<p>Malicious MSI<\/p>\n<pre>ca83b930c2b34a167a39dc04c7917b9f360a95586bce45842868af6b9ad849a2<\/pre>\n<p>Script C2<\/p>\n<pre>65.21.119[.]59<\/pre>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/malicious-ad-served-inside-bing-ai-chatbot\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: bing chat<\/p>\n<p>Tags: AI<\/p>\n<p>Tags: malvertising<\/p>\n<p>Tags: ads<\/p>\n<p>Users looking for software downloads may be tricked into visiting malicious websites via their interaction with Bing Chat.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/malicious-ad-served-inside-bing-ai-chatbot\" title=\"Malicious ad served inside Bing's AI chatbot\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/malicious-ad-served-inside-bing-ai-chatbot\">Malicious ad served inside Bing&#8217;s AI chatbot<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11533,10245,28592,10531,12040],"class_list":["post-23018","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ads","tag-ai","tag-bing-chat","tag-malvertising","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23018"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23018\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23018"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}