{"id":25297,"date":"2024-10-07T10:10:20","date_gmt":"2024-10-07T18:10:20","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/10\/07\/news-19027\/"},"modified":"2024-10-07T10:10:20","modified_gmt":"2024-10-07T18:10:20","slug":"news-19027","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/10\/07\/news-19027\/","title":{"rendered":"Large scale Google Ads campaign targets utility software"},"content":{"rendered":"\n<p>After what seemed like a long hiatus, we&#8217;ve observed threat actors returning to malvertising to drop <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/06\/poseidon-mac-stealer-distributed-via-google-ads\">malware disguised as software downloads<\/a>. The campaign we identified is high-impact, going after utility software such as Slack, Notion, Calendly, Odoo, Basecamp, and others. For this blog, we decided to focus on the Mac version of communication tool Slack.<\/p>\n<p>Following the creation of advertiser identities belonging to real businesses, the threat actors launch their malicious ads, hiding their infrastructure behind several layers of fingerprinting and cloaking.<\/p>\n<p>We have reported these incidents to Google and the related advertisers have been banned. However, we are still finding new malicious ads and hearing from others seeing the same, indicating that this campaign is not over yet.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-wanted-utility-software\">Wanted: Utility software<\/h2>\n<p>The threat actor is abusing various platforms to host their payloads, giving insights into what they are choosing to lure in victims. For Windows users, all payloads were found in various GitHub accounts which we have reported already.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_a98607.png\"><img decoding=\"async\" loading=\"lazy\" width=\"519\" height=\"489\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_a98607.png\" alt=\"\" class=\"wp-image-118585\" \/><\/a><\/figure>\n<p>For Mac, we saw payloads originating from the same domain via PHP scripts using identifiers. These appear to be created for individual and perhaps time-based downloads. Other links that include the name of the software (i.e. <em>clockify_mac.php<\/em>) work regardless.<\/p>\n<pre class=\"wp-block-preformatted\">creativekt[.]com\/macdownloads\/script_6703ea1fc058e8.92130856.php<br>creativekt[.]com\/macdownloads\/script_66ffc3cf465a45.36592714.php<br>creativekt[.]com\/macdownloads\/clockify_mac.php<br>creativekt[.]com\/macdownloads\/script_66e6ba358cd842.42527539.php<\/pre>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_58412b.png\"><img decoding=\"async\" loading=\"lazy\" width=\"664\" height=\"231\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_58412b.png\" alt=\"\" class=\"wp-image-118583\" \/><\/a><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-impersonating-two-identities-at-once\">Impersonating two identities at once<\/h2>\n<p>When we searched for Slack from the US, the top Google result was an ad that looked completely trustworthy. It had the brand&#8217;s logo, official website and even detailed description.<\/p>\n<p>If you follow this blog, you probably know there is more to it. By clicking on the three dots next to the ad, you can see more information about the advertiser, which in this case is a law firm.<\/p>\n<p><em>Note: We understand that most users will not\u2014for lack of time, interest or knowledge\u2014take this step, which is why we offer solutions such as <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">Malwarebytes Browser Guard<\/a> that automatically blocks ads.<\/em><\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/googlead.gif\"><img decoding=\"async\" loading=\"lazy\" width=\"719\" height=\"793\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/googlead.gif\" alt=\"\" class=\"wp-image-118449\" \/><\/a><\/figure>\n<p>The &#8220;My Ad Center&#8221; vignette shows that the advertiser was not verified yet, but we were able to access their profile and see their collection of ads. There were four ads in total, and three of them were related to lawyer services using the name and address of a real company in the US.<\/p>\n<p>The Slack ad was somewhat the odd one sticking out but could, in theory, have been promoted by this advertiser. What we believe is the problem with Google ads is how any advertiser can still use the branding of a major company as if they were them. From the point of view of internet users, this is extremely deceiving and provides no rail guard against abuse.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_c74a70.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1023\" height=\"548\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_c74a70.png\" alt=\"\" class=\"wp-image-118450\" \/><\/a><\/figure>\n<p>After we validated the ad ourselves and saw where it redirected to (a malicious site), we reported it to Google. Very shortly thereafter, Google took action and removed not just the ad, but the advertiser.<\/p>\n<p>However, a couple of days later a new ad appeared, once again using a stolen identity this time from a women&#8217;s health company.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_6bc396.png\"><img decoding=\"async\" loading=\"lazy\" width=\"697\" height=\"648\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_6bc396.png\" alt=\"\" class=\"wp-image-118515\" \/><\/a><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-decoy-site-and-payload\">Decoy site and payload<\/h2>\n<p>As we have seen <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/08\/fraudulent-slack-ad-shows-malvertisers-patience-and-skills\">before<\/a>, the malicious ad starts a redirection chain made of various click trackers, cloaking and a decoy site. This allows victim profiling, but more importantly it is used to avoid automated detection in order to keep the ad up and running as long as possible.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_d51a6f.png\"><img decoding=\"async\" loading=\"lazy\" width=\"727\" height=\"589\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_d51a6f.png\" alt=\"\" class=\"wp-image-118475\" \/><\/a><\/figure>\n<p>Victims eventually land on a decoy sites, similar to those used for phishing credentials, except here the end goal is to trick users into downloading malware.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_8aa7d0.png\"><img decoding=\"async\" loading=\"lazy\" width=\"755\" height=\"601\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_8aa7d0.png\" alt=\"\" class=\"wp-image-118415\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_99bbb7.png\"><img decoding=\"async\" loading=\"lazy\" width=\"792\" height=\"470\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_99bbb7.png\" alt=\"\" class=\"wp-image-118513\" \/><\/a><\/figure>\n<p>Windows users get their respective payload hosted on GitHub. The binaries have been inflated into large files to hinder sandbox analysis and are likely Rhadamathys infostealer.<\/p>\n<p>For Apple users, the installers are also an infostealer, branched out of the AMOS (Atomic Stealer) family. Passwords and other secrets found on a system within the file system, browsers, extensions and apps are grabbed and uploaded as a zip archive onto a remote server located in Russia:<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_7ae34d.png\"><img decoding=\"async\" loading=\"lazy\" width=\"811\" height=\"610\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_7ae34d.png\" alt=\"\" class=\"wp-image-118502\" \/><\/a><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n<p>When we investigate ads, we use a simple yet realistic setup that mimics what most users would have. This is not an automated process, which sometimes requires multiple attempts from different geographic locations and browser profiles. While this work can be tedious and time consuming, we believe it is necessary in order to identify threat actors at the source, therefore providing protection to the Malwarebytes customer base, but also anyone else that uses the Google search engine.<\/p>\n<p>Slack is not the only brand that threat actors like to impersonate. In fact, we also saw and reported malicious ads for the productivity suite Notion. We noticed that it also shared the same payload hosting infrastructure, indicating that the two campaigns were related.<\/p>\n<p>If you are still clicking on ads to download software, you take a risk by allowing fraudulent advertisers to redirect you to malicious sites. Inadvertently installing malware and getting your identity stolen has never been easier.<\/p>\n<p>We recommend paying special attention to sponsored results or adopting a tool such as <a href=\"https:\/\/www.malwarebytes.com\/browserguard\">Malwarebytes Browser Guard<\/a>. For our Mac users, we detect this threat as OSX.Poseidon.<\/p>\n<figure class=\"wp-block-image aligncenter size-large\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_b56c7b.png\"><img decoding=\"async\" loading=\"lazy\" width=\"1214\" height=\"895\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2024\/10\/image_b56c7b.png?w=1024\" alt=\"\" class=\"wp-image-118519\" \/><\/a><\/figure>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>Malicious domains<\/p>\n<pre class=\"wp-block-preformatted\">creativekt[.]com<br>slack[.]designexplorerapp[.]net<br>odoo[.]studioplatformapp[.]net<br>notion[.]foreducationapp[.]com<br>slack[.]workmeetingsapp[.]com<\/pre>\n<p>Payloads (Windows)<\/p>\n<pre class=\"wp-block-preformatted\">9c8dadbb45f63fb07fd0a6b6c36c7aa37621bbadc1bcc41823c5aad1b0d3e93e<br>2b587ca6eb1af162951ade0e214b856f558cc859ae1a8674646f853661704211<br>e3557fb78e8fca926cdb16db081960efc78945435b2233fbd80675c21f0bc2e2<br>637b3ac5b315fd77b582dff2b55a65605f2782a717bed5aa6ef3c9722e926955<br>79017a6a96b19989bcf06d3ceaa42fd124a0a3d7c7fca64af9478e08e6c67c72<br>6eb1e3abf8a94951a661513bee49ffdbecfc8f7f225de83fa9417073814d4601<br>de7b5e6c7b3cee30b31a05cc4025d0e40a14d5927d8c6c84b6d0853aea097733<br>77615ea76aedf283b0e69a0d5830035330692523b505c199e0b408bcccd147b7<\/pre>\n<p>Payloads (Mac)<\/p>\n<pre class=\"wp-block-preformatted\">b55f2cb39914d84a4aa5de2f770f1eac3151ca19615b99bda5a4e1f8418221c2<br>9dc9c06c73d1a69d746662698ac8d8f4669cde4b3af73562cf145e6c23f0ebdd<\/pre>\n<p>Command and control servers<\/p>\n<pre class=\"wp-block-preformatted\">85.209.11[.]155<br>193.3.19[.]251<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2024\/10\/large-scale-google-ads-campaign-targets-utility-software\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Malicious Google sponsored results disguised as software downloads lead to malware. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503],"class_list":["post-25297","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25297"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25297\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}