Heimdal
article featured image

Contents:

Google advertisements have been exploited to distribute various types of malware over the past few months. To trick unsuspecting users into downloading malware onto their systems, threat actors often used the platform to promote fake websites on legit software and application updates.

One such malware family observed during this recent spike is called LOBSHOT. It continues to collect victims while remaining undetected.  Researchers claim that the infrastructure belongs to TA505, the well-known cybercriminal group associated with Dridex, Locky, and Necurs campaigns.

Shedding Light on the Campaign

Earlier this year, Elastic Security Labs observed a multiple infection chain campaign that targeted users searching for legitimate software downloads on Google. Attackers promoted their malware using an elaborate scheme of fake websites through Google Ads and embedding backdoors in what appears to users as legitimate installers.

For example, a malicious ad promoting the AnyDesk remote application was found circulating on the Google search engine. The landing pages looked very similar to that of the original website and included a ‘Download Now’ button. Once the users clicked on the button, it launched the execution of the LOBSHOT malware.

With its hVNC (Hidden Virtual Network Computing) component, LOBSHOT offers a number of core capabilities. This feature allows for direct and unobserved access to the machine. It continues to be effective in bypassing fraud detection systems and is often built into many popular families as a plugin.

LOBSHOT infection chain

Source

According to the report, upon loading the initial libraries, LOBSHOT performs a Windows Defender anti-emulation check. This is achieved by verifying if the computer name matches the string HAL9TH and if the username matches JohnDoe, which are hard-coded values within the emulation layer of Defender. If they are present, the malware immediately stops running. This kind of verification has been incorporated in many other stealers including Arkei, Vidar, and Oski.

Further, after LOBSHOT is executed, it moves a copy of itself to the C:\ProgramData folder, spawning a new process using explorer.exe. This way, it terminates the original process and deletes the original file.

You can review the extended report here.

With banking trojans, cryptocurrency, and information-stealing capabilities, LOBSHOT appears to be used for financial purposes. There are 32 Chrome extensions, nine Edge wallet extensions, and 11 Firefox wallet extensions that are targeted, allowing threat actors to steal cryptocurrency assets.

Why Do We Still Deal with Malvertising?

Malvertising campaigns are a popular way for cybercriminals to distribute malware, indicating that they will continue to use the technique in the future. While malware such as LOBSHOT might seem small and is yet to expand its attack scope, it ends up packing significant functionality, which assists threat actors in moving quickly during the initial stage, allowing them to gain full control over systems remotely.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube for more cybersecurity news and topics.

Author Profile

Mihaela Popa

COMMUNICATIONS & PR OFFICER

Mihaela is a digital content creator for Heimdal® and the proud owner of an old soul and a curious mind. Passionate to learn and discover more about cybersecurity, she will gladly share her latest finds with you.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE