{"id":23174,"date":"2023-10-19T11:10:50","date_gmt":"2023-10-19T19:10:50","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/19\/news-16904\/"},"modified":"2023-10-19T11:10:50","modified_gmt":"2023-10-19T19:10:50","slug":"news-16904","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/10\/19\/news-16904\/","title":{"rendered":"Clever malvertising attack uses Punycode to look like KeePass&#8217;s official website"},"content":{"rendered":"<p>Threat actors are known for impersonating popular brands in order to&nbsp;trick users. In a recent malvertising campaign, we observed a malicious Google ad for KeePass, the open-source password manager which was extremely deceiving. We previously <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ongoing-webex-malvertising-drops-batloader\" target=\"_blank\">reported<\/a> on how brand impersonations&nbsp;are a common occurrence these days due to a feature known as tracking templates, but this attack used an additional layer of deception.<\/p>\n<p>The malicious actors registered a copycat internationalized domain name that uses Punycode, a special character encoding, to masquerade as the&nbsp;real KeePass site. The&nbsp;difference between the two sites is visually so subtle&nbsp;it will undoubtably fool many people.<\/p>\n<p>We have reported this incident to Google but would like to warn users that the ad is still currently running.<\/p>\n<h2>Malicious ad for KeePass<\/h2>\n<p>The malicious advert shows up when you perform a Google search for &#8216;keepass&#8217;, the popular open-source password manager. The ad is extremely deceiving as it features the official Keepass logo, URL and is featured before the organic search result for the legitimate website.<\/p>\n<p>By simply looking at the ad, you would have no idea that it is malicious.&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file64302_284125_e.png\" alt=\"\" width=\"740\" height=\"551\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1: Malicious ad for KeePass followed by legitimate organic search result<\/em><\/p>\n<p>People who click on the ad will be redirected via a cloaking service that is meant to filter sandboxes, bots and anyone not deemed to be a genuine victim. The threat actors have set up a temporary domain at keepasstacking[.]site that performs the conditional redirect to the final destion:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file55229_284125_e.png\" alt=\"\" width=\"602\" height=\"188\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2: Network traffic showing the sequence of redirects upon clicking the ad<\/em><\/p>\n<h2>\u0137eepass.info<\/h2>\n<p>Looking at the network traffic log above, we can see that the destination site uses Punycode,&nbsp;a special encoding to convert Unicode characters to ASCII. The deception is complete for users who may want to verify that they are on the right website.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file60928_284125_e.png\" alt=\"\" width=\"953\" height=\"585\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3: The fake KeePass site with a barely noticeable different font<\/em><\/p>\n<p>While it is barely noticeable, there is a small character under the &#8216;k&#8217;. We can confirm it by <a href=\"https:\/\/www.charset.org\/punycode?encoded=xn--eepass-vbb.info&amp;decode=Punycode+to+normal+text\" target=\"_blank\">converting<\/a> the internationalized domain name&nbsp;<em>xn--eepass-vbb[.]info<\/em> to&nbsp;<em>\u0137eepass[.]info<\/em>:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file47057_284125_e.png\" alt=\"\" width=\"501\" height=\"305\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4: Converting Punycode to ASCII<\/em><\/p>\n<h2>Decoy site links to malicious download<\/h2>\n<p>While the decoy site is not an exact replica of the real one, it still looks very convincing:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file95688_284125_e.png\" alt=\"\" width=\"1126\" height=\"795\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5: Comparing the legitimate site (left) with the fake one (right)<\/em><\/p>\n<p>Victims wanting to download KeePass will&nbsp;retrieve a malicious .msix installer that is digitally signed:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file17828_284125_e.png\" alt=\"\" width=\"509\" height=\"516\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6: The malicious MSIX installer showing a valid digital signature<\/em><\/p>\n<p>Extracting the installer&#8217;s content&nbsp;reveals&nbsp;malicious PowerShell code that belongs to the FakeBat malware family:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file80879_284125_e.png\" alt=\"\" width=\"742\" height=\"620\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7: The contents of the MSIX installer<\/em><\/p>\n<p>This script communicates with the malware&#8217;s command and control server to advertise the new victim before downloading a payload that sets the stage for future recon by human threat actors.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/easset_upload_file5791_284125_e.png\" alt=\"\" width=\"588\" height=\"318\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8: Process view showing execution of the MSIX installer<\/em><\/p>\n<h2>A more sophisticated threat<\/h2>\n<p>While Punycode&nbsp;with internationalized domain names has been used for years by threat actors to phish victims, it shows how effective it remains in the context of brand impersonation via malvertising. Users are first deceived via the Google ad that looks entirely legitimate and then again via a lookalike domain.<\/p>\n<p>As we have noted <a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/the-forgotten-malvertising-campaign\" target=\"_blank\">recently<\/a>, malvertising via search engines is getting more sophisticated. For end users this means that it has become very important to pay close attention where you download programs from and where you should avoid them. In a business environment, we recommend IT admins provide internal repositories where employees can retrieve software installers safely.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p>Ad domain\/redirect<\/p>\n<pre>keepasstacking[.]site<\/pre>\n<p>Fake KeePass site<\/p>\n<pre>xn--eepass-vbb[.]info<\/pre>\n<p>Malicious KeePass download URL<\/p>\n<pre>xn--eepass-vbb[.]info\/download\/KeePass-2.55-Setup.msix<\/pre>\n<p>Malicious KeePass installer<\/p>\n<pre>181626fdcff9e8c63bb6e4c601cf7c71e47ae5836632db49f1df827519b01aaa<\/pre>\n<p>Malware C2<\/p>\n<pre>756-ads-info[.]xyz<\/pre>\n<p>Payload<\/p>\n<pre>refreshmet[.]com\/Package.tar.gpg<\/pre>\n<hr \/>\n<p dir=\"ltr\">Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\" class=\"blue-cta-bttn\">TRY NOW<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/threat-intelligence\" rel=\"category tag\">Threat Intelligence<\/a><\/p>\n<p>Tags: malvertising<\/p>\n<p>Tags: keepass<\/p>\n<p>Tags: punycode<\/p>\n<p>Tags: malware<\/p>\n<p>Tags: ads<\/p>\n<p>Tags: google<\/p>\n<p>Threat actors are doubling down on brand impersonation by using lookalike domain names.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website\" title=\"Clever malvertising attack uses Punycode to look like KeePass's official website\">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website\">Clever malvertising attack uses Punycode to look like KeePass&#8217;s official website<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11533,1670,19011,10531,3764,16824,12040],"class_list":["post-23174","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ads","tag-google","tag-keepass","tag-malvertising","tag-malware","tag-punycode","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23174"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23174\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23174"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}