Threat actors are purchasing advertisements for malicious websites to lure victims into downloading malware, which can eventually lead to data theft and ransomware.
This technique was used in several ad platforms, including search engine ads and social media ads, as they provide a wide range of controls like specific audiences, geographic locations, IP address ranges, browsing history, and device types.
According to the reports shared with Cyber Security News, there have been four different malware families observed during the investigation of these malicious ad campaigns, which were,
In addition to this three different delivery chains were observed in two of them used a renamed version of cURL binary.
In this infection chain, the wscript.exe process is used to initial a DNS request which then executes the Windows installer utility msiexec.exe and installs an application. Furthermore, it uses the rundll32.exe process to load the dropper DLL and executes the “start” function to launch the DANABOT payload.
In this second infection chain, the PAPERTEAR downloader initiates an HTTP POST request to infocatalog[.]pics over port 8080. After this, the wscript.exe executes the one-liner command that eventually drops the DARKGATE malware onto the victim’s system.
The third execution chain is similar to the second one but here the PAPERDROP downloader executes another extended one-liner that uses the renamed curl.exe binary for downloading and installing a malicious package file which drops the DANABOT malware.
Furthermore, a complete report has been published which provides detailed information about the malware capabilities, execution methods, chains, and other information.
Type | Value | Campaign | Malware Family | Attribution |
Domain | www.claimprocessing[.]org | 23-046 | UNC2975 | |
Domain | www.treasurydept[.]org | 23-046 | UNC2975 | |
Domain | www.assetfinder[.]org | 23-046 | UNC2975 | |
Domain | gfind[.]org | 23-046 | UNC2975 | |
Domain | claimunclaimed[.]org | 23-046 | UNC2975 | |
Domain | treasurydept[.]org | 23-046 | UNC2975 | |
Domain | www.myunclaimedcash[.]org | 23-046 | UNC2975 | |
Domain | freelookup[.]org | 23-046 | UNC2975 | |
Domain | capitalfinders[.]org | 23-046 | UNC2975 | |
Domain | plano.soulcarelife[.]org | 23-046 | PAPERDROP | UNC2975 |
Domain | pittsburgh.soulcarelife[.]org | 23-046 | PAPERDROP | UNC2975 |
Domain | durham.soulcarelife[.]org | 23-046 | PAPERDROP | UNC2975 |
Domain | mesa.halibut[.]sbs | 23-046 | PAPERDROP | UNC2975 |
Domain | arlington.barracudas[.]sbs | 23-046 | PAPERDROP | UNC2975 |
Domain | lugbara[.]top | 23-046 | PAPERDROP | UNC2975 |
Domain | lewru[.]top | 23-046 | PAPERDROP | UNC2975 |
Domain | infocatalog[.]pics | 23-046 | DARKGATE | UNC5085 |
Domain | bikeontop[.]shop | 23-046 | DARKGATE | UNC5085 |
Domain | positivereview[.]cloud | 23-046 | DARKGATE | UNC5085 |
Domain | dreamteamup[.]shop | 23-046 | DARKGATE | UNC5085 |
Domain | whatup[.]cloud | 23-046 | DARKGATE | UNC5085 |
Domain | thebesttime[.]buzz | 23-046 | DARKGATE | UNC5085 |
IP Address | 47.253.165[.]1 | 23-046 | UNC2975 | |
IP Address | 8.209.99[.]230 | 23-046 | UNC2975 | |
IP Address | 47.252.45[.]173 | 23-046 | UNC2975 | |
IP Address | 47.252.33[.]131 | 23-046 | UNC2975 | |
IP Address | 47.253.141[.]12 | 23-046 | UNC2975 | |
IP Address | 47.252.45[.]173 | 23-046 | UNC2975 | |
IP Address | 34.16.181[.]0 | 23-046 | DANABOT | |
IP Address | 35.247.194[.]72 | 23-046 | DANABOT | |
IP Address | 35.203.111[.]228 | 23-046 | DANABOT | |
IP Address | 94.228[.]169[.]143 | 23-051 | PAPERTEAR | UNC5085 |
MD5 | 9f9c5a1269667171e1ac328f7f7f6cb3 | 23-046 | DARKGATE | UNC5085 |
MD5 | 2c16eafd0023ea5cb8e9537da442047e | 23-046 | PAPERDROP (Type I) | UNC2975 |
MD5 | 7544f5bb88ad481f720a9d9f94d95b30 | 23-046 | PAPERDROP(Type I) | UNC2975 |
MD5 | 862a42a91b5734062d47c37fdd80c633 | PAPERDROP(Type II) | UNC2956 | |
MD5 | 650b0b12b21e9664d5c771d78738cf9f | PAPERTEAR | UNC5085 | |
MD5 | 9120c82b0920b9db39894107b5494ccd | 23-051 | PAPERTEAR | UNC5085 |
Cary, NC, March 24th, 2025, CyberNewsWire INE Security, a global provider of cybersecurity training and…
A sophisticated phishing campaign targeting Google account credentials through fake Semrush advertisements has emerged, posing…
A highly targeted phishing campaign is currently exploiting Pocket Card users through elaborately crafted emails…
INTERPOL led a multi-national law enforcement operation dubbed "Operation Red Card," which has resulted in…
A novel attack vector combining browser cache exploitation and DLL proxying has emerged as a…
A groundbreaking security tool has emerged in the ongoing battle against sophisticated Linux malware. A…