Thursday, January 30, 2025
HomeMalwareHackers Poisoning the Google Search Results to Spreading Highly Sophisticated Banking Malware

Hackers Poisoning the Google Search Results to Spreading Highly Sophisticated Banking Malware

Published on

SIEM as a Service

Follow Us on Google News

Hackers poisoning Google search results to spreading stealthy Banking Trojan by targetting financial-related keyword searches and make this trojanized Malicious links in Top of the search results with highly trust rate and enabling them to target users with the Zeus Panda banking Trojan.

Nowadays cyber criminals are always one step ahead of traditional attack methods like Email spam and other common communication Medium to spreading the advance level threats.

In this case, poisoning the Google search algorithm to take advantage of this behavior by using Search Engine Optimization (SEO) to make their malicious links more prevalent in the search results that makes enabling them to target users with the Zeus Panda banking Trojan.

Poisoning the financial keywords search result, an attacker can achieve the maximum conversion rate of their infections which leads to gather some useful information about Victims various financial platforms and gain access by attacker and obtain credentials, banking, and credit card information, etc.

Also Read : Silence Trojan Targeting Financial Institutions Recording day to day activity on Bank Employees’ PCs

How Does Hackers Poisoning Google Search Results

Unlike traditional threat spreading methods like Email based malspam, attacker using specific sets of search keywords which will query by targets using search engines such as Google and Bing.

It will be achieved through a compromised web servers and using those servers attackers ensure that, their malicious results would be ranked highly within search engines which will force the viewer to click the top search results.

For an Example, Cisco Talos have analyzed a Specific keyword “al rajhi bank working hours in ramada” that gives a search result with legitimate reviews and top ratings which could achieve by leveraging compromised business websites by poisoning Google Search Results.

Attackers always targetted by mostly used Financial keywords which belong to Bank and Financial sectors.

Especially, poisoning Google Search Results specific to financial institutions in India as well as the Middle East is the region which belongs to most used financial keyword.

    “nordea sweden bank account number”
    “al rajhi bank working hours during ramadan”
    “how many digits in karur vysya bank account number”
    “free online books for bank clerk exam”
    “how to cancel a cheque commonwealth bank”
    “salary slip format in excel with formula free download”
    “bank of baroda account balance check”
    “bank guarantee format mt760”
    “free online books for bank clerk exam”
    “sbi bank recurring deposit form”
    “axis bank mobile banking download link”

So while victims browsing compromised Webservers serach results  they would initiate a multi-stage malware infection process that was redirected to  fake AV scams that display images informing victims that their systems are infected with Zeus and instructing them to contact the listed telephone number.

When the malicious web pages are accessed by victims, the compromised sites use Javascript to redirect clients to Javascript hosted on an intermediary site and  this results in the client retrieving and executing Javascript and you can read complete technical analysis for the Mailicious JS File that has been downloaded by Vicitm.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

Hackers Impersonate Top Tax Firm with 40,000 Phishing Messages to Steal Credentials

Proofpoint researchers have identified a marked increase in phishing campaigns and malicious domain registrations...

Lazarus Group Drop Malicious NPM Packages in Developers Systems Remotely

In a recent discovery by Socket researchers, a malicious npm package named postcss-optimizer has...