{"id":25754,"date":"2025-02-05T23:10:12","date_gmt":"2025-02-06T07:10:12","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2025\/02\/05\/news-19477\/"},"modified":"2025-02-05T23:10:12","modified_gmt":"2025-02-06T07:10:12","slug":"news-19477","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2025\/02\/05\/news-19477\/","title":{"rendered":"University site cloned to evade ad detection distributes fake Cisco installer"},"content":{"rendered":"\n<p>There is a constant &#8220;cat and mouse&#8221; game between defenders and attackers, the latter trying to outsmart and get a head start on the former. In the context of online advertising, this involves creating fake identities or using stolen ones to push out malicious ads.<\/p>\n<p>An attacker not only needs to evade detection but also create a lure that will be convincing to most people. In this blog post, we focus on what malvertisers use in almost all of their campaigns, namely decoys also known as &#8220;white pages&#8221; in order to fool the advertising entity.<\/p>\n<p>The particular case is a malicious Google ad for Cisco AnyConnect, a tool often used by employees to remotely connect to company networks, but also by universities. In fact, we found that threat actors were using the name of a German university to create a fake website designed not to fool actual victims, but rather to bypass detection from security systems.<\/p>\n<p>To be sure, victims were part of the overall scheme, but they were instead redirected to a lookalike Cisco site linking to a malicious installer containing the NetSupport RAT remote access Trojan.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-the-perfect-disguise\">The perfect disguise<\/h2>\n<p>The malicious ad comes up from a Google search for the keywords &#8220;<em>cisco annyconnect<\/em>&#8220;. The ad displays a URL that looks somewhat convincing for the domain <em>anyconnect-secure-client[.]com<\/em>. We should note that this domain was <a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/domain.png\" target=\"_blank\" rel=\"noreferrer noopener\">registered<\/a> less than a day before the ad appeared.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_97aa4e.png\"><img decoding=\"async\" loading=\"lazy\" width=\"735\" height=\"279\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_97aa4e.png\" alt=\"\" class=\"wp-image-148841\" \/><\/a><\/figure>\n<p>Upon clicking on the ad, server-side checks will determine whether this is a potential victim or not. Typically, a real victim has a residential IP address and other network settings that differentiate it from crawlers, bots, VPNs or proxies.<\/p>\n<p>In recent times, we have seen criminals <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2024\/12\/ai-generated-malvertising-white-pages-are-fooling-detection-engines\">rely on AI to generate fake pages<\/a> that look innocuous. These are also referred to as &#8220;white pages&#8221; and they do serve an important purpose. If it&#8217;s obviously so fake and bad, it will raise suspicion. We thought that in this case the perpetrator had a rather clever idea by stealing content from a university that actually does use Cisco AnyConnect.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_6e1fb8.png\"><img decoding=\"async\" loading=\"lazy\" width=\"724\" height=\"692\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_6e1fb8.png\" alt=\"\" class=\"wp-image-148849\" \/><\/a><\/figure>\n<p>Technische Universit\u00e4t Dresden (TU Dresden), is a public research university in Germany whose site can be found <a href=\"https:\/\/tu-dresden.de\/zih\/dienste\/service-katalog\/arbeitsumgebung\/zugang_datennetz\/vpn\/ssl_vpn?set_language=en\">here<\/a>. Funnily enough, the threat actors left a trail while doing their copy\/paste. We can see that they added the cookie opt-in notification which is required for websites in Europe, which here leaked their browser language (Russian).<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_af681d.png\"><img decoding=\"async\" loading=\"lazy\" width=\"697\" height=\"411\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_af681d.png\" alt=\"\" class=\"wp-image-148852\" \/><\/a><\/figure>\n<h2 class=\"wp-block-heading\" id=\"h-real-victims-get-infected-with-malware\">Real victims get infected with malware<\/h2>\n<p>As good as this template looks, real victims will never see it. Instead, upon connecting to the malicious server they will be immediately redirected to a phishing site for Cisco AnyConnect.<\/p>\n<p>The payload is downloaded in a similar way to a campaign we had already observed before, using a PHP script that provides the direct download URL. We can see from the network traffic capture below that the file is hosted on a likely compromised WordPress site.<\/p>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_e3ce13.png\"><img decoding=\"async\" loading=\"lazy\" width=\"760\" height=\"191\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_e3ce13.png\" alt=\"\" class=\"wp-image-148854\" \/><\/a><\/figure>\n<figure class=\"wp-block-image aligncenter size-full\"><a href=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_f1ceb1.png\"><img decoding=\"async\" loading=\"lazy\" width=\"741\" height=\"692\" src=\"https:\/\/www.malwarebytes.com\/wp-content\/uploads\/sites\/2\/2025\/01\/image_f1ceb1.png\" alt=\"\" class=\"wp-image-148853\" \/><\/a><\/figure>\n<p>There is not much to be said about the fake installer other than it being digitally signed with a valid certificate. Upon execution it extracts <em>client32.exe<\/em>, a name notorious for being associated with NetSupport RAT.<\/p>\n<pre class=\"wp-block-preformatted\">cisco-secure-client-win-5.0.05040-core-vpn-predeploy-k9.exe<br>  -&gt; client32.exe<br>  -&gt; \"icacls\" \"C:ProgramDataCiscoMedia\" \/grant *S-1-1-0:(F) \/grant Users:(F) \/grant Everyone:(F) \/T \/C<\/pre>\n<p>The remote access Trojan connects to the following two IP addresses: 91.222.173[.]67 and 199.188.200[.]195, further granting a remote attacker access to the victim&#8217;s machine.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h2>\n<p>Brand impersonation is a common theme with search ads. As Google enforces various policies and uses algorithms to detect malicious activity, threat actors need to constantly come up with new ideas.<\/p>\n<p>Reusing a university page was a clever idea, but there were a couple of things that made this attack shy of being perfect. The domain name, while very strong for impersonation, was newly registered. Since it was part of the ad&#8217;s display URL, it could have potentially been detected by Google. We also noted that the perpetrators left a trail when they copy\/pasted the code from the university website, which identified their likely country of origin.<\/p>\n<p>Having said that, the malware payload was digitally signed and had few detections when first seen, so this attack may have had a decent success rate.<\/p>\n<p>As always, we recommend that users take precautions whenever looking up programs to download, and to be especially wary of sponsored results.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on threats\u2014we remove them<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep threats off your devices by&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/for-home\">downloading Malwarebytes today<\/a>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-indicators-of-compromise\">Indicators of Compromise<\/h2>\n<p>Malvertising infrastructure<\/p>\n<pre class=\"wp-block-preformatted\">anyconnect-secure-client[.]com<br>cisco-secure-client[.]com[.]vissnatech[.]com<\/pre>\n<p>NetSupport RAT download<\/p>\n<pre class=\"wp-block-preformatted\">berrynaturecare[.]com\/wp-admin\/images\/cisco-secure-client-win-5[.]0[.]05040-core-vpn-predeploy-k9[.]exe<br>78e1e350aa5525669f85e6972150b679d489a3787b6522f278ab40ea978dd65d<\/pre>\n<p>NetSupport RAT C2s<\/p>\n<pre class=\"wp-block-preformatted\">monagpt[.]com<br>mtsalesfunnel[.]com<br>91.222.173[.]67\/fakeurl.htm<br>199.188.200[.]195\/fakeurl.htm<\/pre>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/cybercrime\/2025\/02\/university-site-cloned-to-evade-ad-detection-distributes-fake-cisco-installer\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Malvertisers got inspired by the website for a German university to bypass ad security and distribute malware. <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503],"class_list":["post-25754","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25754"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25754\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}