Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Researchers discovered a malvertising campaign that uses Google Ads to target users searching for popular software. The campaign is tracked as MasquerAds and is attributed to a threat actor under the name Vermux. The campaign’s goal is to distribute tainted versions of popular software that install malicious payloads on the user’s machines, such as information-stealing malware like Raccoon Stealer and Vidar.
By hijacking searches for specified keywords, the activity makes use of supposedly trustworthy websites with typosquatted domain names that are displayed on top of Google search results in the form of malicious adverts.
The attacker utilized a series of benign sites to mislead users into clicking on them and then redirecting them to rogue sites.
“The moment those “disguised” sites are being visited by targeted visitors (those who actually click on the promoted search result) the server immediately redirects them to the rogue site and from there to the malicious payload — usually also hiding inside reputable file sharing and code hosting servers like GitHub, dropbox, discord’s CDN, etc” researcher stated.
AnyDesk, Dashlane, Grammarly, Malwarebytes, Microsoft Visual Studio, MSI Afterburner, Slack, and Zoom are among the impersonated software used in the campaign.
Threat actors behind this campaign put a significant effort into the malicious payload used in the campaign, such as using stealers that can bypass defense solutions.
‘Even for Virus-Total, it took many days after our submission to acquire more than a few handful detections,’ says the researcher.
The Vermux operation has deployed hundreds of domains and servers located mostly in Russia, while the rogue advertising mostly targeted users in the United States and Canada.
“masquerAd” concept is simple yet does exactly what those actors need — abuse the trust we sometimes blindly give to Google and their promoted search results. Adding to the above, the abuse of reputable file-sharing services as well as well-known software brands make them evade even the most advanced EDRs on the market.”
The report concludes, Don’t be misled by misspelling domain names, and always double-check where you obtain your files from.