Talos researchers spotted a series of malvertising campaigns using fake installers of popular apps and games as a lure to trick users into downloading a new backdoor and an undocumented malicious Google Chrome extension.
According to Talos, the threat actor has been active at least since late 2018, experts observed intermittent activity towards the end of 2019 and through early 2020. The group resurfaced in April 2021, the malvertising campaigns targeted users in Canada, the U.S., Australia, Italy, Spain, and Norway.
Upon executing the fake installers, they execute the following pieces of malware on the victim’s system:
“The attack begins when a victim looks for a particular piece of software for download. Talos believes the attacker has set up an advertising campaign that will present links to a web page, offering the download of a software installer. The installer has many different file names. For example: viber-25164.exe, wechat-35355.exe, build_9.716-6032.exe, setup_164335.exe, nox_setup_55606.exe and battlefieldsetup_76522.exe.” reads the post published by Talos. “When executed, this installer does not install the actual software it announces, but instead executes a malicious loader on the system.”
Cisco Talos researchers attributed the campaigns to an unknown threat actor tracked as “magnat.” The experts noticed that the group is reportedly updating the malware families.
The MagnatExtension, which masquerades as Google’s Safe browsing, allows attackers to steal form data, harvest cookies, and also execute arbitrary JavaScript code on the victim’s system.
The C2 address used by the extension is hardcoded, it can be updated by the current C2 with a list of additional C2 domains. The attackers also implemented a backup mechanism for C2, that allows to obtain a new C2 address from a Twitter search for hashtags like “#aquamamba2019” or “#ololo2019.”
The algorithm for getting the domain from the tweet is simple as effective, it concatenates the first letter of each word of the content of a tweet. The tweet “Squishy turbulent areas terminate active round engines after dank years. Industrial creepy units” that contains the hashtag “#aquamamba2019” is translated to “stataready[.]icu.”
Once an active C2 is available, the data are sent in json format in the body of an HTTP POST request. The json string is encrypted.
“Based on the use of password stealers and a Chrome extension that is similar to a banking trojan, we assess that the attacker’s goals are to obtain user credentials, possibly for sale or for his own use in further exploitation,” concludes Cisco Talos. “The motive for the deployment of an RDP backdoor is unclear. The most likely are the sale of RDP access, the use of RDP to work around online service security features based on IP address or other endpoint installed tools or the use of RDP for further exploitation on systems that appear interesting to the attacker.”
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, malvertising)
[adrotate banner=”5″]
[adrotate banner=”13″]
Canada's airline WestJet has suffered a cyberattack that impactd access to some internal systems and…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware…
A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…
Palo Alto Networks addressed multiple vulnerabilities and included the latest Chrome patches in its solutions.…
Fog ransomware operators used in a May 2025 attack unusual pentesting and monitoring tools, Symantec…
Cyberattack on United Natural Foods Inc. (UNFI) disrupts deliveries, causing Whole Foods shortages nationwide after…
This website uses cookies.