Malware

DealPly adware abuses reputation services to remain under the radar

Malware researchers from enSilo have spotted a new variant of the DealPly adware that uses a new method to avoid detection.

Researchers from enSilo have discovered a new variant of the modular DealPly adware that abuses the reputation services provided by Microsoft’s SmartScreen (aka Windows Defender SmartScreen) and McAfee’s WebAdvisor to avoid detection.

The main feature of the DealPly adware is to install browser extensions that display advertisements in the victim’s browser.

“Besides of modular code, machine fingerprinting, VM detection techniques and robust C&C infrastructure, the most intriguing discovery was the way DealPly abuses Microsoft and McAfee reputation services to remain under the radar. Microsoft SmartScreen and McAfee WebAdvisor provide threat intelligence verdicts on files and URLs and are free to use.  ” reads the analysis published by enSilo.

This new variant abuses Microsoft and McAfee reputation services to evade the detection, it likely uses the services to check which of its variants and download sites are tracked as malicious and avoid to use them in future campaigns.

Let’s see in detail how the DealPly adware abuses the reputation services. The experts discovered that Some reputation modules are used only for certain countries. The country codes are organized into two groups and for each group, a different module is executed.

SmartScreen reputation module is used only on hosts located in the countries listed in Group A, while the McAfee WebAdvisor reputation module is used on hosts located in the countries listed in Group B. Anyway, some countries are included in both groups.

To avoid being blacklisted by Microsoft while querying the SmartScreen reputation service, DealPly will use the machines it manages to infect and will use them as a distributed network of machines for harvesting this data.

Upon initial execution, the SmartScreen module implemented by the adware will automatically deliver an empty request to the C2 server that in turn will reply with an XML formatted message containing information such as hashes/urls to be queried using the SmartScreen.

The SmartScreen reputation server appends an Authorization header that is used to prevent unwanted alterations of the requests.

The response sent by the SmartScreen includes a string describing the checked URL. The DealPly adware will focus on the following components and will send them to its C2 :

UNKN – Unknown URL/File
• MLWR- Malware related URL/File
• PHSH – Phishing related URL/File

Experts highlighted the fact that the SmartScreen API is undocumented, this means that the author of the malware has spent a significant effort in reverse engineering the inner workings of the SmartScreen mechanism\feature.

Experts noticed that the DealPly adware supports multiple versions of the SmartScreen API to query the service on several Windows versions.

As anticipated, the adware also abuses McAfee’s WebAdvisor reputation service.

DealPly will send a request to the WebAdvisor service via the https://webadvisorc.rest.gti.mcafee.com/1 URL and will get data from the response.

enSilo researchers believe that this evasion technique will most probably be adopted by other malware in the future.

“In this blog we present an innovative technique adopted by DealPly operators to automate the evasion from AV products.By constantly querying reputation services they are able to automatically assess their AV detection rate and generate new samples when needed. This technique enable DealPly to always stay ahead of security solutions.” conclude the experts.

“This technique was initially observed when analyzing DealPly adware, yet we believe that it is only a matter of time before advanced malware operations will follow the trend.”

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – DealPly adware, malware)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Over 80,000 servers hit as Roundcube RCE bug gets rapidly exploited

A critical remote code execution (RCE) vulnerability in Roundcube was exploited days after patch, impacting…

7 hours ago

A flaw could allow recovery of the phone number associated with any Google account

A vulnerability could allow recovery of the phone number associated with a Google account by…

12 hours ago

Texas Department of Transportation (TxDOT) data breach exposes 300,000 crash reports

Hackers breached Texas DOT (TxDOT), stealing 300,000 crash reports with personal data from its Crash…

22 hours ago

SAP June 2025 Security Patch Day fixed critical NetWeaver bug

SAP fixed a critical NetWeaver flaw that let attackers bypass authorization and escalate privileges. Patch…

1 day ago

U.S. CISA adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds RoundCube Webmail and Erlang Erlang/OTP SSH server flaws…

1 day ago

Mirai botnets exploit Wazuh RCE, Akamai warned

Mirai botnets are exploiting CVE-2025-24016, a critical remote code execution flaw in Wazuh servers, Akamai…

1 day ago