{"id":23254,"date":"2023-10-30T16:10:02","date_gmt":"2023-10-31T00:10:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16984\/"},"modified":"2023-10-30T16:10:02","modified_gmt":"2023-10-31T00:10:02","slug":"news-16984","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16984\/","title":{"rendered":"Clever malvertising attack uses Punycode to look like KeePass&#8217;s official website"},"content":{"rendered":"\n<p>Threat actors are known for impersonating popular brands in order to&nbsp;trick users. In a recent malvertising campaign, we observed a malicious Google ad for KeePass, the open-source password manager which was extremely deceiving. We previously&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/09\/ongoing-webex-malvertising-drops-batloader\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a>&nbsp;on how brand impersonations&nbsp;are a common occurrence these days due to a feature known as tracking templates, but this attack used an additional layer of deception.<\/p>\n<p>The malicious actors registered a copycat internationalized domain name that uses Punycode, a special character encoding, to masquerade as the&nbsp;real KeePass site. The&nbsp;difference between the two sites is visually so subtle&nbsp;it will undoubtably fool many people.<\/p>\n<p>We have reported this incident to Google but would like to warn users that the ad is still currently running.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-malicious-ad-for-keepass\">Malicious ad for KeePass<\/h2>\n<p>The malicious advert shows up when you perform a Google search for &#8216;keepass&#8217;, the popular open-source password manager. The ad is extremely deceiving as it features the official Keepass logo, URL and is featured before the organic search result for the legitimate website.<\/p>\n<p>By simply looking at the ad, you would have no idea that it is malicious.&nbsp;<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"740\" height=\"551\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/easset_upload_file64302_284125_e.png\" alt=\"\" class=\"wp-image-93991\" \/><\/figure>\n<p><em>Figure 1: Malicious ad for KeePass followed by legitimate organic search result<\/em><\/p>\n<p>People who click on the ad will be redirected via a cloaking service that is meant to filter sandboxes, bots and anyone not deemed to be a genuine victim. The threat actors have set up a temporary domain at keepasstacking[.]site that performs the conditional redirect to the final destination:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"602\" height=\"188\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/easset_upload_file55229_284125_e.png\" alt=\"\" class=\"wp-image-93992\" \/><\/figure>\n<p><em>Figure 2: Network traffic showing the sequence of redirects upon clicking the ad<\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-keepass-info\">\u0137eepass.info<\/h2>\n<p>Looking at the network traffic log above, we can see that the destination site uses Punycode,&nbsp;a special encoding to convert Unicode characters to ASCII. The deception is complete for users who may want to verify that they are on the right website.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"953\" height=\"585\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/easset_upload_file60928_284125_e.png\" alt=\"\" class=\"wp-image-93994\" \/><\/figure>\n<p><em>Figure 3: The fake KeePass site with a barely noticeable different font<\/em><\/p>\n<p>While it is barely noticeable, there is a small character under the &#8216;k&#8217;. We can confirm it by&nbsp;<a href=\"https:\/\/www.charset.org\/punycode?encoded=xn--eepass-vbb.info&amp;decode=Punycode+to+normal+text\" target=\"_blank\" rel=\"noreferrer noopener\">converting<\/a>&nbsp;the internationalized domain name&nbsp;<em>xn--eepass-vbb[.]info<\/em>&nbsp;to&nbsp;<em>\u0137eepass[.]info<\/em>:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"501\" height=\"305\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-4.png\" alt=\"\" class=\"wp-image-93995\" \/><\/figure>\n<p><em>Figure 4: Converting Punycode to ASCII<\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-decoy-site-links-to-malicious-download\">Decoy site links to malicious download<\/h2>\n<p>While the decoy site is not an exact replica of the real one, it still looks very convincing:<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1126\" height=\"795\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-5.png?w=1024\" alt=\"\" class=\"wp-image-93996\" \/><\/figure>\n<p><em>Figure 5: Comparing the legitimate site (left) with the fake one (right)<\/em><\/p>\n<p>Victims wanting to download KeePass will&nbsp;retrieve a malicious .msix installer that is digitally signed:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"509\" height=\"516\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-6.png\" alt=\"\" class=\"wp-image-93997\" \/><\/figure>\n<p><em>Figure 6: The malicious MSIX installer showing a valid digital signature<\/em><\/p>\n<p>Extracting the installer&#8217;s content&nbsp;reveals&nbsp;malicious PowerShell code that belongs to the FakeBat malware family:<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"742\" height=\"620\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-7.png\" alt=\"\" class=\"wp-image-93998\" \/><\/figure>\n<p><em>Figure 7: The contents of the MSIX installer<\/em><\/p>\n<p>This script communicates with the malware&#8217;s command and control server to advertise the new victim before downloading a payload that sets the stage for future recon by human threat actors.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"588\" height=\"318\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2023\/10\/image-8.png\" alt=\"\" class=\"wp-image-93999\" \/><\/figure>\n<p><em>Figure 8: Process view showing execution of the MSIX installer<\/em><\/p>\n<h2 class=\"wp-block-heading\" id=\"h-a-more-sophisticated-threat\">A more sophisticated threat<\/h2>\n<p>While Punycode&nbsp;with internationalized domain names has been used for years by threat actors to phish victims, it shows how effective it remains in the context of brand impersonation via malvertising. Users are first deceived via the Google ad that looks entirely legitimate and then again via a lookalike domain.<\/p>\n<p>As we have noted&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/the-forgotten-malvertising-campaign\" target=\"_blank\" rel=\"noreferrer noopener\">recently<\/a>, malvertising via search engines is getting more sophisticated. For end users this means that it has become very important to pay close attention where you download programs from and where you should avoid them. In a business environment, we recommend IT admins provide internal repositories where employees can retrieve software installers safely.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>Ad domain\/redirect<\/p>\n<pre class=\"wp-block-code\"><code>keepasstacking&#091;.]site<\/code><\/pre>\n<p>Fake KeePass site<\/p>\n<pre class=\"wp-block-code\"><code>xn--eepass-vbb&#091;.]info<\/code><\/pre>\n<p>Malicious KeePass download URL<\/p>\n<pre class=\"wp-block-code\"><code>xn--eepass-vbb&#091;.]info\/download\/KeePass-2.55-Setup.msix<\/code><\/pre>\n<p>Malicious KeePass installer<\/p>\n<pre class=\"wp-block-code\"><code>181626fdcff9e8c63bb6e4c601cf7c71e47ae5836632db49f1df827519b01aaa<\/code><\/pre>\n<p>Malware C2<\/p>\n<pre class=\"wp-block-code\"><code>756-ads-info&#091;.]xyz<\/code><\/pre>\n<p>Payload<\/p>\n<pre class=\"wp-block-code\"><code>refreshmet&#091;.]com\/Package.tar.gpg<\/code><\/pre>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p>Malwarebytes EDR and MDR removes all remnants of ransomware and prevents you from getting reinfected. Want to learn more about how we can help protect your business? Get a free trial below.<\/p>\n<div class=\"wp-block-malware-bytes-button mb-button\" id=\"mb-button-9707d860-55e9-4fe3-ac49-83aaeb389620\">\n<div class=\"mb-button__row u-justify-content-center\">\n<div class=\"mb-button__item mb-button-item-0\">\n<p class=\"btn-main\"><a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\/\">TRY NOW<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/threat-intelligence\/2023\/10\/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Threat actors are known for impersonating popular brands in order to&#160;trick users. In a recent malvertising campaign, we observed a malicious&#8230; <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[11533,1670,19011,10531,3764,16824,12040],"class_list":["post-23254","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-ads","tag-google","tag-keepass","tag-malvertising","tag-malware","tag-punycode","tag-threat-intelligence"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23254"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23254\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}