Thursday, February 6, 2025
HomeBotnetPop-up Ads & Hundreds of Websites Helping to Distribute Botnets, Cryptocurrency Miners...

Pop-up Ads & Hundreds of Websites Helping to Distribute Botnets, Cryptocurrency Miners and Ransomware

Published on

SIEM as a Service

Follow Us on Google News

A Malicious Software Downloader called ICLoader through Popup Ads and over hundreds of websites are pushing various PUA such as Botnets, cryptocurrency Miners and also a emerging GandCrab ransomware.

Malware Files are sharing via Popup Ads and distributing over Hundreds file sharing websites and fake software sharing sites and advertisement maker websites which all are still alive.

Malicious ICLoader Targeting a specific set of software users and it pop-up malicious ads with those software names in a compromised website that contain a high visitors traffic.

There are 3 main sources attackers used to Distribute the ICLoader

  1. Pop-up ads on free file sharing service websites that are used for distributing the malicious software where users can upload the malicious files and generating a download link.
  2. The second method of distributing fake software sharing websites. In this case, attackers create 117 websites and each sites sharing hundreds of malicious software.The sites list detailed descriptions of software and have ‘free download’ buttons to the cracked versions at the bottom of the page and it redirects to downloader software, mainly ICLoader.
  3. Two Torrent sharing websites that mimic real torrent download websites that distributing ICLoader from the link that leads to download ICLoader.

How ICLoader installation works via Popup Ads

Once the victims click the link, it redirects to traffic management server where a user will reach the ICLoader page and link will drop the ICL Downloader.

Also, ICLoader has a different hash value every time it is downloaded from the server and  ICLoader server distribute a zip archive which contains the ICLoader software.

According to TrendMicro, The ICLoader file has the name of the software that the victims originally intended to download, which is part of the ruse to convince victims that the download is legitimate. Once victims execute the ICLoader file, they will see the typical software installation instructions and steps. All of the PUA software we tracked were also signed with a valid COMODO certificate, which adds to the appearance of validity.

Later ICLoader downloads and installs the legitimate software and later it communicates with C&C Server to receive an aditional malicious files.

This ICLoader previously installed either installed or additionally loaded seven different groups of botnets, four different cryptocurrency miners, and the GandCrab ransomware

Cryptocurrency miner download link contains a shortened URL  shortened URLs show that the miner botnet has around 80 thousand victims that constantly load their miner and mine for them every day.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Paragon Spyware Allegedly Ends Spyware Contract with Italy

Paragon Solutions, an Israeli cybersecurity firm, has reportedly ended its spyware contract with Italy.The...

Authorities Arrested Hacker Who Compromised 40+ Organizations

Spanish authorities have arrested a hacker believed to be responsible for cyberattacks targeting over...

OpenAI Data Breach – Threat Actor Allegedly Claims 20 Million Logins for Sale

OpenAI may have become the latest high-profile target of a significant data breach.A...

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Lumma Stealer Attacking Windows Users In India With Fake Captcha Pages

Cybersecurity experts are raising alarms over a new wave of attacks targeting Windows users...

Beware of Lazarus LinkedIn Recruiting Scam Targeting Org’s to Deliver Malware

A new wave of cyberattacks orchestrated by the North Korea-linked Lazarus Group has been...

North Korean Hackers Use custom-made RDP Wrapper to activate remote desktop on Hacked Machines

In a concerning development, the North Korean-backed hacking group Kimsuky has intensified its use...