Get all your news in one place.
100’s of premium titles.
One app.
Start reading
TechRadar
TechRadar
Sead Fadilpašić

Microsoft reveals over a million PCs hit by malvertising campaign

Pirate skull cyber attack digital technology flag cyber on on computer CPU in background. Darknet and cybercrime banner cyberattack and espionage concept illustration.

  • Microsoft says it discovered a major malvertising campaign
  • The goal was to deploy infostealers as wide as possible
  • The company removed an undisclosed number of GitHub repositories in response

More than a million PCs have been infected by infostealers through a massive malvertising campaign, new research from Microsoft’s security researchers has revealed.

The campaign starts on illegal streaming sites where people can watch pirated content. Apparently, cybercriminals injected ads into those videos, which sent visitors through a roller coaster of redirects, before landing on one of many GitHub repositories under the attackers’ control.

There, they would download the first payload which would run system discovery and collect system information (operating system data, screen resolution, memory size, etc.), exfiltrate it to a server under the attackers’ control, while deploying the second-stage payload.

Infostealers in action

The second-stage payload depends on the compromised device. In some cases, it will be a NetSupport remote access trojan (RAT), followed by the Lumma Stealer or Doenerium infostealer. This malware can grab people’s login credentials, cryptocurrency information, banking details, and more. In other cases, the malware will download an executable file which runs a CMD and drops a renamed AutoIt interpreter with a .com extension.

AutoIt then runs a few additional steps which ultimately lead to the same outcome - the exfiltration of sensitive files from the target system.

In most cases, the payloads were hosted on GitHub, and Microsoft said it took down an undisclosed number of repositories. However, malware was also hosted on Dropbox and Discord. It did not attribute the campaign to any particular threat actor, and said that the victims were found in a wide range of industries.

"This activity is tracked under the umbrella name Storm-0408 that we use to track numerous threat actors associated with remote access or information-stealing malware and who use phishing, search engine optimization (SEO), or malvertising campaigns to distribute malicious payloads," Microsoft said.

"The campaign impacted a wide range of organizations and industries, including both consumer and enterprise devices, highlighting the indiscriminate nature of the attack."

Via BleepingComputer

You might also like

Sign up to read this article
Read news from 100’s of titles, curated specifically for you.
Already a member? Sign in here
Related Stories
Top stories on inkl right now
One subscription that gives you access to news from hundreds of sites
Already a member? Sign in here
Our Picks
Fourteen days free
Download the app
One app. One membership.
100+ trusted global sources.