drahardja, to ai
@drahardja@sfba.social avatar

New SEO just dropped yo

“Google's new AI search results promotes sites pushing malware, scams”

https://www.bleepingcomputer.com/news/google/googles-new-ai-search-results-promotes-sites-pushing-malware-scams/

th3_protoCOL, to random

WinSCP is a popular target for malware campaign abusing google ads. Here's one from this morning:

  1. Google search for winscp
  2. Click the first link, user redirection
    ➡️​ winscp-eng[.]org
    ➡️​ winscp-static-746341.c.cdn77[.]org
  3. Button click, malware download
    ➡️​ https[:]//parsecworks[.]org/us/downloads/WinSCP-6.1.2-Setup.exe

https://www.virustotal.com/gui/file/b503e810b31151f8d79bc0db2b46daddc53f27a2fd741c30355726892591e5b3/detection

VirusTotal submission report with a detection ratio of 1/63
Fake WinSCP site used to distribute malware

th3_protoCOL, to random

themed around the gaming app "parsec"

Initial fake site: parsecus[.]net

Malware downloaded from: parsecworks[.]com

Digitally signed malware "parsec-windows.exe"

Both the distribution site and download url are hosted on 93.190.143.252

Google displaying malware ads above the true website for parsec
Screenshot of virus total, 3/63 vendors are detecting the file
Malware with a digital signature from SSL.com, signed 2 days prior on the 19th

cybersecboardrm, to Cybersecurity
jeromesegura, to random

Unknown stealer distributed via

C2: webvideoshareonline[.]com/bitrix/main.php

Sandbox with PCAP:
https://tria.ge/231219-3ne2xahbar/behavioral1

cc @da_667

avoidthehack, to wordpress

hosting service Kinsta targeted by phishing ads

Threat actors using Google Ads to lure people to fake Kinsta pages in an effort to steal hosting credentials. Be careful of where you click, even on "trusted" pages like Google search results.

Generally, it's best to avoid clicking on sites in the sponsored results of Google (or any search engine, really).

Using an adblocker prevents this section from loading in most cases.

https://www.bleepingcomputer.com/news/security/wordpress-hosting-service-kinsta-targeted-by-google-phishing-ads/

funes, to infosec

A couple weeks back we noticed an uptick of incidents from trojanized Advanced IP Installer's delivered due to #malvertising. We tied it back to a group who were formerly a #darkside #ransomware affiliate according to Mandiant.

You may remember articles circulating about Bing's AI providing malvertising links. This is from the same campaign.

#infosec #malware #ioc #detectionengineering #threatintel #threathunting

https://www.connectwise.com/blog/cybersecurity/former-darkside-ransomware-affiliate-distributing-trojanized-installers-via-malvertising

th3_protoCOL, to random

How can anyone reasonably expect a user to detect google ad abuse without visiting the malicious site?

Here's an example of a malicious google ad spoofing anydesk today.

This one redirects users to https[:]//anyowpdesk[.]com before downloading .msi malware:
https://www.virustotal.com/gui/file/9d85ae9e45556067d0b833144e7d9935936a3a3098fe65fc198409083a3a33a6/relations

Fake AnyDesk website

avoidthehack, to Cybersecurity

Associated Press, ESPN, CBS among top sites serving fake #virus alerts

Malvertising on top news sites.

Connected with threat actor "ScamClub." A large portion of this campaign targets mobile users.

-Insert my spiel about using an adblocker- Ads can be blocked in browsers, on devices, and on networks.

#malware #cybersecurity #infosec #security #malvertising

https://www.malwarebytes.com/blog/threat-intelligence/2023/11/associated-press-espn-cbs-among-top-sites-serving-fake-virus-alerts

MisuseCase, to security
@MisuseCase@twit.social avatar

Hey @leo glad to hear in the latest episode of :steve: (Episode 949) that is not just a way of reducing annoyance but also a feature because of the proliferation of .

I say all the time on here that using an is a way of protecting yourself because ad delivery platforms are a huge vector for malware and . This would be largely fixable if the owners of these platforms cared, but they don’t.

gpshead, to random

Every time I see anyone complain about YouTube or any other media site blocking Adblock users, I see entitled people who refuse to compensate their content creators and hosting providers. I wonder how many of you bother to fund your mastodon fediverse instances.

I often use an adblocker. I get it. I respect anyone who denies to serve me as a result. This is working as intended.

Netflix revenue and subscriber numbers went up after they got real about account sharing anti-freeloader enforcement. Clearly a lot of people admitted that value existed and they had been freeloaders just because they could.

cxiao,

@gpshead @brettcannon I have a hard time sympathizing with this, because adblocking is also a security feature. Online ads remain one of the most prevalent delivery vectors for malware. Often this takes the form of advertisement for software -> download site purportedly serving installer for said software -> installer executes malicious code.

For this reason, a lot of corporate IT environments push out adblock extensions to browser installations on endpoint machines, or do DNS-based blocking. Therefore, using an adblocker often isn't even the choice of the end user; it's something that's mandated by their IT department on their work computer.

CISA and NSA both have public advisories highlighting this issue, and recommending that organizations deploy adblockers. Note that in their advisories, they explicitly mention the ability of malicious actors to target advertisements towards specific groups of users or demographics when purchasing ads; this is of course a feature baked in to how modern online advertisements work.

See also: the hashtag here.

https://www.cisa.gov/sites/default/files/publications/Capacity_Enhancement_Guide-Securing_Web_Browsers_and_Defending_Against_Malvertising_for_Federal_Agencies.pdf

https://www.nsa.gov/portals/75/documents/what-we-do/cybersecurity/professional-resources/csi-blocking-unnecessary-advertising-web-content.pdf?v=1

ben, to Youtube
@ben@mastodon.bentasker.co.uk avatar

Cheeky fuckers.

have deployed Javascript that delays video load if the user is using

https://old.reddit.com/r/youtube/comments/17z8hsz/youtube_has_started_to_artificially_slow_down/

kkarhan,
@kkarhan@mstdn.social avatar

@ben @mozilla @EU_Commission @BNetzA @antidiskriminierung

PS: Yes, are an accessibility and necessity since exists and too has so much that it's clear that never vetted or enforced any rules towards advertisers but only against .

See ...

r000t, to random
@r000t@fosstodon.org avatar

The Associated Press just served me an ad for fake anti-virus. The entire page was taken over, and forwarded to the malicious site, within seconds of opening the news article, every time.

An ad blocker isn't just something to hide some annoying eyesores, it's a vital layer of security.

If you have friends or family who might fall for fake AV or "windows technical the department" scams, they need an ad blocker. No site they visit can be considered "safe" unless it simply doesn't have ads.

video/mp4

kkarhan,
@kkarhan@mstdn.social avatar
techygeek, to Cybersecurity
jeromesegura, to random

The KeePass is back on (from the same advertiser as previously).

New domain: keeqass[.]com
New malware C2: 11234jkhfkujhs[.]xyz

cc @dangoodin

image/png
image/png

ai6yr, to Cybersecurity
FrohlichMarcel, (edited )
@FrohlichMarcel@mathstodon.xyz avatar

@ai6yr @FroehlichMarcel
„Adversaries can even create carefully tailored ads as part of a targeted campaign against a specific victim.“

0x58, to Cybersecurity

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #42/2023 is out! It includes the following and much more:

➝ 🔓 👀 Tracking Unauthorized Access to #Okta's Support System
➝ 🔓 🇯🇵 #Casio discloses #databreach impacting customers in 149 countries
➝ 🔓 🧬 Hacker leaks millions more #23andMe user records on #cybercrime forum
➝ 🔓 🇨🇳 D-Link confirms data breach after employee #phishing attack
➝ 🔓 💰 #Equifax Fined $13.5 Million Over 2017 Data Breach
➝ 🇺🇦 🧹 Ukrainian activists hack Trigona #ransomware gang, wipe servers
➝ 🇺🇸 🇰🇵 FBI: Thousands of Remote IT Workers Sent Wages to #NorthKorea to Help Fund Weapons Program
➝ 🇮🇳 ☁️ #India targets #Microsoft, #Amazon tech support #scammers in nationwide crackdown
➝ 🇵🇸 🇮🇷 #Hamas-linked app offers window into cyber infrastructure, possible links to Iran
➝ 👮🏻‍♂️ 🥷🏻 Police seize #RagnarLocker leak site
➝ 🇰🇵 North Korean Hackers Exploiting Recent #TeamCity Vulnerability
➝ 🇨🇳 🇷🇺 #China replaces #Russia as top #cyberthreat
➝ 🇺🇦 📡 CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks
➝ 🇫🇷 🇪🇸 #France frees the two biggest Spanish hackers
➝ 🇺🇸 ⚓️ Ex-Navy IT head gets 5 years for selling people’s data on #darkweb
➝ 🇨🇭 🗳️ #Switzerland’s e-voting system has predictable implementation blunder
➝ 🔓 🏭 Critical Vulnerabilities Expose ​​#Weintek HMIs to Attacks
➝ 🔓 🏭 #Milesight Industrial Router #Vulnerability Possibly Exploited in Attacks
➝ 🦠 🇻🇳 Fake #Corsair job offers on #LinkedIn push #DarkGate malware
➝ 🦠 Google-hosted #malvertising leads to fake #Keepass site that looks genuine
➝ 🦠 💬 #Discord still a hotbed of #malware activity — Now APTs join the fun
➝ 🦠 🕵🏻‍♂️ SpyNote: Beware of This Android #Trojan that Records Audio and Phone Calls
➝ 🛍️ 🦠 #Android will now scan sideloaded apps for malware at install time
➝ 💬 🔐 #WhatsApp #passkeys on the way, but as usual, for Android first
➝ 🇷🇺 🗂️ Pro-Russian Hackers Exploiting Recent #WinRAR Vulnerability in New Campaign
➝ 🗓️ ❌ Signal Pours Cold Water on Zero-Day Exploit Rumors
➝ 🔓 💥 #Cisco warns of new #IOS XE #zeroday actively exploited in attacks

📚 This week's recommended reading is: "RTFM: Red Team Field Manual v2" by Ben Clark and Nicholas Downer

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

https://infosec-mashup.santolaria.net/p/infosec-mashup-week-422023

landley, to random
@landley@mstdn.jp avatar

The Colorado state supreme court approved a search warrant demanding Google tell them everyone who searched for a given keyword.

https://youtu.be/KH3VYCh7z5o

Rule 17 of the internet: any data retained long enough will leak. Google should not store this information. Next year, expect Texas to subpoena Google for everyone who has ever made abortion related searches in the past 5 years.

kkarhan,
@kkarhan@mstdn.social avatar

@landley I'd say they are because they ain't targeted by campaigns or at least they were able to prevent those until now...

Nit that I'd trust them - I don't.

I jist have a long ttack record of their search actually delivering results and not being shit...

jbzfn, to infosec
@jbzfn@mastodon.social avatar

🔎 Google-hosted malvertising leads to fake Keepass site that looks genuine
➥Ars Technica

「 There’s no surefire way to detect either malicious Google ads or punycode-encoded URLs. Posting ķeepass[.]info into all five major browsers leads to the imposter site. When in doubt, people can open a new browser tab and manually type the URL, but that’s not always feasible when they’re long 」

https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/

itnewsbot, to security
@itnewsbot@schleuss.online avatar

Google-hosted malvertising leads to fake Keepass site that looks genuine - Enlarge (credit: Miragec/Getty Images)

Google has been caught ... - https://arstechnica.com/?p=1977141 #malvertising #security #punycode #malware #biz#google

arstechnica, to random
@arstechnica@mastodon.social avatar

Google-hosted malvertising leads to fake Keepass site that looks genuine

Google-verified advertiser + legit-looking URL + valid TLS cert = convincing look-alike.

https://arstechnica.com/security/2023/10/google-hosted-malvertising-leads-to-fake-keepass-site-that-looks-genuine/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

hopfgeist,
@hopfgeist@digitalcourage.social avatar

@arstechnica Speaking of google, today was the first time I got one of those deepfake Elon Musk-videos about something something cryptocurrency as an ad before a youtube video. And I could find no way to flag or report an ad. I've reported those abominations when they were normal videos, but as ads?

jeromesegura, to random

There is a live Google search campaign targeting users. The malicious domain name uses Punycode to trick victims.

https://www.malwarebytes.com/blog/threat-intelligence/2023/10/clever-malvertising-attack-uses-punycode-to-look-like-legitimate-website

image/png

Lil_VampireCJ, to random

Welp, looks like Ublock Origin is over... YT now detects it and harasses your ass to try & give up your safety/comfort just so they can throw malicious ads down your throat.

And no, I won't stop using my adblocker as it keeps me safe, comfortable and secure from the tones of malicious/toxic ads YT tries to expose you to.

Hopefully UBlock manage to find a patch that stops YT from doing this if its still possible.

kkarhan,
@kkarhan@mstdn.social avatar

@Lil_VampireCJ And since is a real issue, agencies around the globe like @bsi recommend as a means to counter and ...
https://mastodon.pnpde.social/@JonasJRichter/111249045770504615

MisuseCase, to microsoft
@MisuseCase@twit.social avatar

Predictably, #microsoft started injecting ads into #openai #gpt4 powered #bingchat conversations…and just as predictably, there is now a huge #malvertising problem in Bing Chat.

It’s actually worse than #malware poisoned advertisements showing up in search engine results for a couple of reasons.

https://www.malwarebytes.com/blog/threat-intelligence/2023/09/malicious-ad-served-inside-bing-ai-chatbot

/1

MisuseCase,
@MisuseCase@twit.social avatar

We could be using #AI tools to help with things like searching for #malware or develop #threatmodels or tailor #cybersecurity controls. A company like #microsoft could use it for some of these things (they have a widely used threat modeling methodology and associated tool). Instead they are using it to trick people with #bingchat and make #malvertising worse.

/end

  • All
  • Subscribed
  • Moderated
  • Favorites
  • provamag3
  • InstantRegret
  • magazineikmin
  • modclub
  • khanakhh
  • Youngstown
  • rosin
  • mdbf
  • slotface
  • Durango
  • ngwrru68w68
  • thenastyranch
  • kavyap
  • DreamBathrooms
  • JUstTest
  • cubers
  • osvaldo12
  • Leos
  • anitta
  • everett
  • ethstaker
  • GTA5RPClips
  • tester
  • cisconetworking
  • megavids
  • tacticalgear
  • normalnudes
  • lostlight
  • All magazines