Saturday, November 2, 2024
HomeAdwareNew Malware Framework Generated More Than one Billion Fraudulent ad Impression Via...

New Malware Framework Generated More Than one Billion Fraudulent ad Impression Via Browser Extension

Published on

Malware protection

Researchers discovered a new malware framework that developed to perform fraudulent Google AdSense impressions by installing a malicious browser extension.

In the past 3 months, This Malware framework gained more than one billion fraudulent ad impressions and generated a significant Google AdSense revenue every month.

Threat actors behind this malvertising campaign abusing the content and advertising platforms by deploying the malware and generating a huge amount of revenue.

- Advertisement - SIEM as a Service

Malware framework is designed to pad statistics on social sites and ad impressions by including Google Chrome, Mozilla Firefox, and Yandex’s browser and install a malicious browser extension.

Malicious browser extension not only designed to gain ad impression but also generate likes on YouTube videos and watch hidden Twitch streams. 

“Flashpoint researchers found the malicious code that searches for YouTube referrers and then injects a new script tag to load code for YouTube. In this case, the injected JavaScript has an extensive amount of code that is designed to like videos, most of which are related to political topics in Russia.”

Stages to Install Browser Extension

Threat actors are using three separate stages such as Installer, Finder and Patcher to install the malicious browser extension.

Once malware framework infecting the victim’s browsers, the Installer component set up a new browsers extension and it make sure the extension was successfully installed.

Next component Dubbed Finder is ultimately designed to steal browser logins and cookies which is later package in .zip files and send it to the attacker via command and control server.

It also retrieves update binaries instructing from separate C2 panel that check-in with compromised bots and send back stolen credentials and cookie data.

Final Module Patcher component is responsible for installing the browser extension.

Malicious Extension Behaviour

After the successful installation in the browser, the extension begins injecting ads and generating the hidden traffic.

Most of the code written in this framework intended to commit ad fraud and the scripts also used to search and replace the ad-related code on web pages and eventually report the ad clicks to the C2 server.

According to Flashpoint report, the scripts do not inject every website, and most carry large blacklists of domains that are mostly Google domains and Russian websites. In addition, the scripts also attempt to avoid injects into pornographic sites, as these may throw off the impressions. The malware is concentrated in a few geographic locations, led by Russia, Ukraine, and Kazakhstan.

You can download the complete Indicators of Compromise in both CSV and MISP JSON format

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Malwarebytes New Browser Extension That Protects you From Visiting Malicious Websites

PythonBot- Dangerous Adware Install on Browser Extension & Bypass Security System

Malicious Chrome and Edge Browser Extension Deliver Powerful Backdoor & RAT to Spy Victims PC

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

6 Best Ad Blockers for Android Devices in 2024 to Stop Annoying Ads

Ad-blocking software is one of the most convenient types of software available, helping users...

How does an ad blocker apk work & How does it protect your information?

Did you know that the average Internet user sees about 7,000 advertisements per day?...

Beware!! New Ad-Blocking Chrome Extension That Injects Malicious Ads

A new malicious browser extension, known as AllBlock has been detected to be injecting...