Threat actors are purchasing advertisements for malicious websites to lure victims into downloading malware, which can eventually lead to data theft and ransomware.
This technique was used in several ad platforms, including search engine ads and social media ads, as they provide a wide range of controls like specific audiences, geographic locations, IP address ranges, browsing history, and device types.
According to the reports shared with Cyber Security News, there have been four different malware families observed during the investigation of these malicious ad campaigns, which were,
In addition to this three different delivery chains were observed in two of them used a renamed version of cURL binary.
In this infection chain, the wscript.exe process is used to initial a DNS request which then executes the Windows installer utility msiexec.exe and installs an application. Furthermore, it uses the rundll32.exe process to load the dropper DLL and executes the “start” function to launch the DANABOT payload.
In this second infection chain, the PAPERTEAR downloader initiates an HTTP POST request to infocatalog[.]pics over port 8080. After this, the wscript.exe executes the one-liner command that eventually drops the DARKGATE malware onto the victim’s system.
The third execution chain is similar to the second one but here the PAPERDROP downloader executes another extended one-liner that uses the renamed curl.exe binary for downloading and installing a malicious package file which drops the DANABOT malware.
Furthermore, a complete report has been published which provides detailed information about the malware capabilities, execution methods, chains, and other information.
Type | Value | Campaign | Malware Family | Attribution |
Domain | www.claimprocessing[.]org | 23-046 | UNC2975 | |
Domain | www.treasurydept[.]org | 23-046 | UNC2975 | |
Domain | www.assetfinder[.]org | 23-046 | UNC2975 | |
Domain | gfind[.]org | 23-046 | UNC2975 | |
Domain | claimunclaimed[.]org | 23-046 | UNC2975 | |
Domain | treasurydept[.]org | 23-046 | UNC2975 | |
Domain | www.myunclaimedcash[.]org | 23-046 | UNC2975 | |
Domain | freelookup[.]org | 23-046 | UNC2975 | |
Domain | capitalfinders[.]org | 23-046 | UNC2975 | |
Domain | plano.soulcarelife[.]org | 23-046 | PAPERDROP | UNC2975 |
Domain | pittsburgh.soulcarelife[.]org | 23-046 | PAPERDROP | UNC2975 |
Domain | durham.soulcarelife[.]org | 23-046 | PAPERDROP | UNC2975 |
Domain | mesa.halibut[.]sbs | 23-046 | PAPERDROP | UNC2975 |
Domain | arlington.barracudas[.]sbs | 23-046 | PAPERDROP | UNC2975 |
Domain | lugbara[.]top | 23-046 | PAPERDROP | UNC2975 |
Domain | lewru[.]top | 23-046 | PAPERDROP | UNC2975 |
Domain | infocatalog[.]pics | 23-046 | DARKGATE | UNC5085 |
Domain | bikeontop[.]shop | 23-046 | DARKGATE | UNC5085 |
Domain | positivereview[.]cloud | 23-046 | DARKGATE | UNC5085 |
Domain | dreamteamup[.]shop | 23-046 | DARKGATE | UNC5085 |
Domain | whatup[.]cloud | 23-046 | DARKGATE | UNC5085 |
Domain | thebesttime[.]buzz | 23-046 | DARKGATE | UNC5085 |
IP Address | 47.253.165[.]1 | 23-046 | UNC2975 | |
IP Address | 8.209.99[.]230 | 23-046 | UNC2975 | |
IP Address | 47.252.45[.]173 | 23-046 | UNC2975 | |
IP Address | 47.252.33[.]131 | 23-046 | UNC2975 | |
IP Address | 47.253.141[.]12 | 23-046 | UNC2975 | |
IP Address | 47.252.45[.]173 | 23-046 | UNC2975 | |
IP Address | 34.16.181[.]0 | 23-046 | DANABOT | |
IP Address | 35.247.194[.]72 | 23-046 | DANABOT | |
IP Address | 35.203.111[.]228 | 23-046 | DANABOT | |
IP Address | 94.228[.]169[.]143 | 23-051 | PAPERTEAR | UNC5085 |
MD5 | 9f9c5a1269667171e1ac328f7f7f6cb3 | 23-046 | DARKGATE | UNC5085 |
MD5 | 2c16eafd0023ea5cb8e9537da442047e | 23-046 | PAPERDROP (Type I) | UNC2975 |
MD5 | 7544f5bb88ad481f720a9d9f94d95b30 | 23-046 | PAPERDROP(Type I) | UNC2975 |
MD5 | 862a42a91b5734062d47c37fdd80c633 | PAPERDROP(Type II) | UNC2956 | |
MD5 | 650b0b12b21e9664d5c771d78738cf9f | PAPERTEAR | UNC5085 | |
MD5 | 9120c82b0920b9db39894107b5494ccd | 23-051 | PAPERTEAR | UNC5085 |
Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…
ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…
Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…
Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…
Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…
Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…